US20090271343A1 - Automated entity identification for efficient profiling in an event probability prediction system - Google Patents

Automated entity identification for efficient profiling in an event probability prediction system Download PDF

Info

Publication number
US20090271343A1
US20090271343A1 US12/110,261 US11026108A US2009271343A1 US 20090271343 A1 US20090271343 A1 US 20090271343A1 US 11026108 A US11026108 A US 11026108A US 2009271343 A1 US2009271343 A1 US 2009271343A1
Authority
US
United States
Prior art keywords
entities
entity
transaction
computer
subset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/110,261
Other versions
US8121962B2 (en
Inventor
Anthony Vaiciulis
Larry Peranich
Uwe Mayer
Scott Zoldi
Shane De Zilwa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fair Isaac Corp
Original Assignee
Fair Isaac Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fair Isaac Corp filed Critical Fair Isaac Corp
Priority to US12/110,261 priority Critical patent/US8121962B2/en
Assigned to FAIR ISAAC CORPORATION reassignment FAIR ISAAC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PERANICH, LARRY, VAICIULIS, ANTHONY, ZOLDI, SCOTT M., DE ZILWA, SHANE, MAYER, UEW
Publication of US20090271343A1 publication Critical patent/US20090271343A1/en
Assigned to FAIR ISAAC CORPORATION reassignment FAIR ISAAC CORPORATION CORRECTIVE ASSIGNMENT TO CORRECT THE SPELLING OF ASSIGNOR #3 NAME FROM UEW MAYER TO UWE MAYER PREVIOUSLY RECORDED ON REEL 021527 FRAME 0450. ASSIGNOR(S) HEREBY CONFIRMS THE EXECUTED ASSIGNMENT ATTACHED SHOWS THE CORRECT SPELLING OF THE 3RD ASSIGNOR'S FULL NAME. Assignors: PERANICH, LARRY, VAICIULIS, ANTHONY, ZOLDI, SCOTT M., DE ZILWA, SHANE, MAYER, UWE
Priority to US13/399,067 priority patent/US8332338B2/en
Application granted granted Critical
Publication of US8121962B2 publication Critical patent/US8121962B2/en
Priority to US13/710,423 priority patent/US8645301B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Definitions

  • This disclosure relates generally to a computer-based, real-time system for event probability prediction that implements an efficient profiling technology which minimizes required computer resources and allows for the identification of entities exhibiting anomalous behavior.
  • Computer-based event probability prediction systems traditionally use some amount of historical information, a profile, about individual objects in order to compare present behavior with past behavior. Each of these objects is defined to be an entity, while a set of similar objects is defined to be an entity class. Examples of events to predict include whether or not a loan applicant will default on a loan and whether or not a credit card transaction is fraudulent. Examples of entities include a particular customer account at a bank and a particular Automatic Teller Machine (ATM).
  • ATM Automatic Teller Machine
  • an event probability prediction system often includes a mathematical model or combination of models which extracts patterns from historical data and uses the patterns on the present transaction data to calculate a score, a number that represents the likelihood that a particular event will occur.
  • the model or models in the system traditionally need to store and access the profile for every existing entity in the entity class (e.g. every ATM being considered in the problem).
  • Limitations of computer resources require that such a large amount of information is maintained in a disk-resident profile database, external to the computer program forming the core of the event probability prediction system. This leads to several issues in the development and running of the event probability prediction system:
  • This document presents a new computer-based event probability prediction system and method that has two main advantages over previous systems.
  • the new system uses computer resources more efficiently which allows it to achieve faster execution times and simplified implementation.
  • the new system allows for the identification and reporting of those entities which display anomalous behavior when viewed across multiple dimensions of the data and within a higher risk set of entities.
  • the core of the system and method is a specialized profiling that efficiently maintains historical information only on a small number of entities rather than on all of the entities in a particular entity class.
  • the resulting type of profile, a Concise Profile uses Automated Entity Identification (AEI) which allows a large disk-resident profile database to be replaced with a small dynamic table stored in memory.
  • AEI Automated Entity Identification
  • a Concise Profile consists of 1) an online-updated, importance-ranked AEI table that contains the profile records for a concise subset of entities and 2) a recycling algorithm, based on an objective function related to the probability of a particular event, that determines the dynamic membership of the table.
  • the system and method further calculates statistics on the AEI table to identify outliers, entities which exhibit anomalous behavior, to be reported to users of the system independent of the main score(s).
  • a computer-implemented method includes steps of defining a first subset of entities belonging to one or more entity classes, and constructing at least one historical profile for each entity in the subset of entities based on a set of possible outcomes of transaction behavior of each entity in the first subset of entities. Based on the historical profiles, a second subset of entities having transaction behavior associated with a transaction is selected, the transaction behavior being predictive of at least one targeted outcome from the set of possible outcomes. The method further includes the step of redefining the first subset of entities with the second subset of entities.
  • FIG. 1 shows an overview of the flow of data records through the event probability prediction system.
  • FIG. 2 shows the steps involved in updating the AEI table for the Concise Profile.
  • FIG. 3 shows a possible configuration of the system in which a feedback loop is added.
  • FIG. 4 shows a possible configuration of the system in which the Concise Profile variables are used to augment the output score of a base model.
  • FIG. 5 shows a possible configuration of the system in which the Concise Profile variables are not blended with the base model output, but are used as input to the base model.
  • FIG. 6 shows a possible configuration of the system in which the Concise Profile variables are used to augment a base model and the output of the base model is used as additional input for the updating of the AEI table.
  • FIG. 7 shows a possible configuration of the system identical to that shown in FIG. 4 except for the addition of feedback loops.
  • FIG. 8 shows a possible configuration of the system in which the Concise Profile variables are used to augment a base model only when the base model score lies in a desired range.
  • FIG. 9 shows a possible configuration of the system identical to that shown in FIG. 8 except for the addition of feedback loops.
  • FIG. 10 shows a table illustrating average transactions per hour of specific entities.
  • This document describes a computer-based, realtime system for event probability prediction implementing efficient profiling technology which minimizes required computer resources and allows for the identification of entities exhibiting anomalous behavior.
  • the invention applies to event probability prediction in general but to aid in the description the details of the invention are discussed below using a fraud detection system as a specific instance of the invention
  • the system calculates, for example, the probability that a financial transaction is fraudulent.
  • Concise Profile a profiling technology
  • AEI Automated Entity Identification
  • a Concise Profile provides an online-updated, importance-ranked AEI table that contains profile records for a concise subset of entities whose dynamic membership is determined by a recycling algorithm, described in more detail below.
  • This recycling algorithm is based on an objective function which uses criteria that are related to the probability that the transaction is associated with fraud.
  • each row in the AEI table corresponds to a single entity and contains two types of information: 1) information used to determine the rank of the entity in the table and 2) Concise Profile variables.
  • the recycling algorithm ensures that entities exhibiting the behavior of interest (e.g. apparent fraud) have a consistently high rank in the AEI table, while other entities have a lower rank or may be removed from the table.
  • the AEI table allows the invention to achieve something traditional systems are unable to do easily.
  • the entities which are represented in the AEI table at any given time form a carefully selected, high-risk subset of the entire entity class by virtue of the recycling algorithm.
  • Concise Profiles can be used simultaneously in a single fraud detection system. These profiles can be constructed to monitor many different entity classes and even different aspects of a single entity class by using a variety of recycling algorithms.
  • the system can use information from the various AEI tables to detect anomalies that may only be visible when viewed from multiple dimensions (i.e. using multiple Concise Profiles).
  • the identity of the corresponding entity is known and can be used in a separate, dedicated system to handle such anomalies or can be included in a report sent to a human fraud analyst. This ability to detect, identify, and report in real time or near real time on the entities which exhibit anomalous behavior when viewed from several dimensions gives the invention a significant advantage over traditional fraud detection systems.
  • FIG. 1 An overview of the flow of data records through an example fraud detection system is shown in FIG. 1 .
  • Each new data record received sequentially, corresponds to a single transaction involving the entity classes being used in the Concise Profiles.
  • At least one Concise Profile table is required, but multiple Concise Profile tables, which each have a limited view into fraud, are required if multiple entity classes are being profiled as indicated in FIG. 1 and in other figures.
  • a new data record 102 e.g. an ATM transaction
  • the data in the record is used to update the AEI table for the entity class implemented as Concise Profile 1 .
  • each one corresponds to a different entity class and each has a corresponding AEI table. All AEI tables are updated using information in the data record.
  • the values of the variables stored in the AEI tables for the entities involved in the current transaction are output to the Concise Profile model at step 106 which uses the variables to evaluate (score) the record.
  • the score and the input data record are passed to a case management system in which human fraud experts determine whether the record is actually a fraudulent record or a non-fraudulent record.
  • the case management system allows the fraud expert to access other data sources including communicating with the legitimate person who is authorized to conduct the transaction (e.g. the credit card holder).
  • FIG. 2 illustrates the steps involved in updating the AEI table for the Concise Profile.
  • the system reduces the importance rating of each row in the AEI table. These importance ratings are used to rank order the entities represented in the table.
  • the importance rating update procedure follows a mathematical formula which can be symbolized by the equation.
  • f new represents the new importance rating of a particular row in the table
  • f old represents the importance rating that takes into account all records up to but not including the new record
  • X represents the collection of information from the new record that may be useful in updating the importance rating
  • g( ) represents the function whose output is the new importance rating.
  • the recycling algorithm may ensure that entities occurring in frequent or recent transactions have a consistently high rank in the AEI table, while other entities have a lower rank. In this case entities which occur rarely in transactions would have rare, short-lived appearances in the table.
  • the importance rating then becomes equivalent to a frequency. To achieve this behavior, the updated frequency for each entity in the table can be recomputed on every input transaction according to the equation.
  • f j and f j ⁇ 1 are the values of the decayed frequency for a particular entity in the table after the j'th and (J ⁇ 1)'th transactions
  • is a value between zero and one and is used to reduce all of the importance ratings in the table (step 204 )
  • ⁇ j is zero if the j'th transaction did not involve the particular entity for which the decayed frequency is being computed or one if the j'th transaction did involve the particular entity for which the decayed frequency is being computed.
  • the frequency can be related to different objective functions such as the number of transactions involving a card used for the first-time at the ATM, the number of transactions in which the amount is greater than some threshold, the number of transactions with a base model score greater than some threshold, etc.
  • the system calculates a key value which uniquely identifies the entity within the entity class.
  • the system uses the key value to determine whether or not the entity is already represented in the AEI table.
  • the entity If the entity is not already represented in the AEI table, then it becomes a candidate to be added with its importance rating set to a predetermined initial value. This addition occurs in one of the following two ways depending on whether or not the table is already full (i.e. all available rows are occupied), a determination made in step 210 . If the table is full then in step 212 the system determines whether the initial importance rating is greater than the importance rating of the lowest-ranked entity in the table. If this condition is not satisfied, then at step 214 the system outputs the default values of the Concise Profile variables and the new entity will not have its profile record added to the table. It is possible to configure the system in such a way that the condition is always satisfied, so entities not found in the table always have their profile record added to the table.
  • step 216 the system removes the profile record for the lowest ranked entity in the table, which is the entity having the lowest frequency among all entities represented in the table. This step, together with step 204 , ensures that profile records for entities which have low importance ratings will be replaced in the table by profile records for entities from more recent transactions.
  • step 218 the profile record for the new entity is added to the table with the initial importance rating value. If at step 210 it is determined that the table is not already full, then the system proceeds directly to step 218 in which the profile record for the new entity is added to the table with the initial importance rating value.
  • step 220 the Concise Profile variables defined for this entity class are calculated for this entity using information in the record 202 .
  • step 208 the system proceeds directly to step 222 in which the importance rating of the entity is increased. This step ensures that an entity with important behavior maintains a high rank in the table.
  • step 224 the Concise Profile variables defined for this entity class are updated for this entity using information in the record 202 .
  • step 226 the system re-ranks the entities represented in the table based on importance rating.
  • step 228 the system outputs the values of the Concise Profile variables for the entity.
  • An entity that could be used in a fraud detection system is an ATM.
  • This type of fraudulent behavior would cause the affected ATM to be highly ranked in the AEI table (assuming an importance rating update equation that emphasizes recent or frequent transactions) which would allow the fraud detection system at step 104 to maintain constantly updated Concise Profile variables describing the behavior of this particular ATM. Wisely constructed variables chosen to reflect differences between patterns of fraudulent behavior and patterns of non-fraudulent behavior would be evaluated by the Concise Profile model (step 106 ) and produce a score consistent with the transactions at this ATM being fraudulent.
  • FIG. 3 shows a possible configuration of the system identical to that shown in FIG. 1 except for the addition of a feedback loop in which information flows from case management at step 308 directly to the update of the AEI table at step 304 .
  • the purpose of the feedback is to allow the system to rapidly incorporate new information on changing fraud patterns.
  • the feedback consists of a confirmed fraud/nonfraud tag, the data for the record corresponding to the tag, and the model score for the record.
  • the feedback improves the performance of the system in environments containing a significant amount of dynamic fraud.
  • One of the uses of this technique is to update risk tables of different entities to reflect the most current fraud risk in the production environment.
  • An existing fraud detection system may contain one or more mathematical models which calculate a score representing the likelihood that the new data record corresponds to a fraudulent transaction. If these models, represented by the process labeled Base Model at step 404 in FIG. 4 , already achieve a relatively high level of fraud detection then it may make sense to keep them in the system, using the Concise Profile variables to augment the base model output. This is depicted in FIG. 4 .
  • the new data record 402 is used as input both to the base model at step 404 and to the AEI table update at step 406 .
  • the output from step 404 includes the scores from each of those models as well as the values of the variables created by those models.
  • the Concise Profile variables from step 406 are blended (mathematically combined) at step 408 with the output from the base model. In this way the system produces a final score which is sent to the case management step 410 .
  • the final blended score can more accurately estimate the likelihood of fraud than the base model score alone.
  • the base model may maintain profiles about individual bank customers while a Concise Profile may maintain historical information about individual ATMs. This difference enables the Concise Profile variables to capture a complementary dimension of the data which is likely to increase the performance of the final score over that of the base model.
  • the base model may be sufficiently complex and flexible that it can handle the Concise Profile variables being used at its input.
  • the input to the base model consists of the new data record as well as all Concise Profile variables.
  • This has the potential to create a high performance system (i.e. one attaining a high level of fraud detection) because all of the available information is accessible to the mathematical model at the same time.
  • One drawback, however, is that the internal operation of the base model necessarily changes if the Concise Profile variables contain information which help to discriminate between fraud and nonfraud records. If this change in the base model is not desired or not feasible, then the configuration of FIG. 4 described above may be preferred. In the system of FIG. 4 the base model remains unchanged by the addition of the Concise Profile variables into the system.
  • FIG. 4 On the other hand, one can consider an alternative modification of the system in FIG. 4 .
  • the base model remains unchanged but its output is used to create one or more of the Concise Profile variables. This is depicted in FIG. 6 in which the output of step 604 is used at the input to step 606 .
  • the Concise Profiles are able to incorporate into their variables the score or scores from the base model as well as the variables created by the base model.
  • FIG. 7 shows a configuration in which feedback is used to update the Concise Profile variables which are then blended with the base model output.
  • the final score sent to the case management step could be the base model score itself except when this score is in a desired range.
  • the desired range can be set, for example, to be the score range in which business operating points are set and where the accuracy of the predictions are the most crucial.
  • FIG. 8 This configuration of the system is illustrated in FIG. 8 . It is similar to the system described in reference to FIG. 4 except for the addition of the decision step 808 .
  • the base model score is examined. If the score is in the desired range then the base model output is sent to step 810 and blended with the Concise Profile variables.
  • the score sent to the case management step 812 is a blending of the base model output and the Concise Profile variables. If, however, the base model score is not in the desired range then the score sent to the case management step 812 is the unmodified base model score.
  • the Concise Profile variables are able to improve the performance of the fraud detection system by augmenting the base model only when augmentation can be most beneficial.
  • FIG. 9 shows another system that is similar to the system described in reference to FIG. 4 and FIG. 8 , except for the addition of the decision step 908 and a feedback loop.
  • the base model score is examined. If the score is in the desired range then the base model output is sent to step 910 and blended with the Concise Profile variables. In this situation the score sent to the case management step 912 is a blending of the base model output and the Concise Profile variables. If, however, the base model score is not in the desired range then the score sent to the case management step 912 is the unmodified base model score.
  • a feedback loop is added to the system, the result is the system illustrated in FIG. 9 .
  • Many other system configurations of various combinations of the main features described above e.g. multiple Concise Profiles, feedback loops, blending based on a score range, concise Profile variables used as input to base model, base model output used as input to AEI table updates, etc.
  • AII Automatic Identity Identification
  • outliers such as this have a value which is greater than, for example, ten standard deviations away from the mean value of the statistic being calculated, then the system has identified (hence the term Automatic Identity Identification) an extreme outlier (i.e. an ATM exhibiting the riskiest behavior) and can report it to a human fraud analyst or police authorities for further investigation or immediate action.
  • This type of identification and reporting of outliers would be difficult to achieve for a traditional fraud detection system that uses a full profile database given the computational expense of running regular queries on the full set of ATMs and having only limited views of the fraud characteristics.
  • Doing Automatic Identity Identification analysis on several small concise profile tables enables fast and efficient detection of outliers at a variety of dimensions associated with the fraud behaviors.
  • Embodiments of the invention can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium, e.g., a machine readable storage device, a machine readable storage medium, a memory device, or a machine-readable propagated signal, for execution by, or to control the operation of, data processing apparatus.
  • a computer readable medium e.g., a machine readable storage device, a machine readable storage medium, a memory device, or a machine-readable propagated signal, for execution by, or to control the operation of, data processing apparatus.
  • data processing apparatus encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers.
  • the apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of them.
  • a propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode information for transmission to suitable receiver apparatus.
  • a computer program (also referred to as a program, software, an application, a software application, a script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program does not necessarily correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
  • the processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output.
  • the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
  • a processor will receive instructions and data from a read only memory or a random access memory or both.
  • the essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to, a communication interface to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, to name just a few.
  • Information carriers suitable for embodying computer program instructions and data include all forms of non volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks.
  • the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
  • embodiments of the invention can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
  • a display device e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • keyboard and a pointing device e.g., a mouse or a trackball
  • Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • Embodiments of the invention can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the invention, or any combination of such back end, middleware, or front end components.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.
  • LAN local area network
  • WAN wide area network
  • the computing system can include clients and servers.
  • a client and server are generally remote from each other and typically interact through a communication network.
  • the relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • embodiments of the invention have been described. Other embodiments are within the scope of the following claims. For example, the steps recited in the claims can be performed in a different order and still achieve desirable results.
  • embodiments of the invention are not limited to database architectures that are relational; for example, the invention can be implemented to provide indexing and archiving methods and systems for databases built on models other than the relational model, e.g., navigational databases or object oriented databases, and for databases having records with complex attribute structures, e.g., object oriented programming objects or markup language documents.
  • the processes described may be implemented by applications specifically performing archiving and retrieval functions or embedded within other applications.

Abstract

A computer-implemented method and system for automated entity identification for efficient profiling in an event probability prediction system. A first subset of entities belonging to one or more entity classes is defined. At least one historical profile is constructed for each entity in the subset of entities based on a set of possible outcomes of transaction behavior of each entity in the first subset of entities. Based on the historical profiles, a second subset of entities having transaction behavior associated with a transaction is selected, the transaction behavior being predictive of at least one targeted outcome from the set of possible outcomes. The first subset of entities is redefined with the second subset of entities.

Description

    BACKGROUND
  • This disclosure relates generally to a computer-based, real-time system for event probability prediction that implements an efficient profiling technology which minimizes required computer resources and allows for the identification of entities exhibiting anomalous behavior.
  • Computer-based event probability prediction systems traditionally use some amount of historical information, a profile, about individual objects in order to compare present behavior with past behavior. Each of these objects is defined to be an entity, while a set of similar objects is defined to be an entity class. Examples of events to predict include whether or not a loan applicant will default on a loan and whether or not a credit card transaction is fraudulent. Examples of entities include a particular customer account at a bank and a particular Automatic Teller Machine (ATM).
  • To achieve high performance, an event probability prediction system often includes a mathematical model or combination of models which extracts patterns from historical data and uses the patterns on the present transaction data to calculate a score, a number that represents the likelihood that a particular event will occur. The model or models in the system traditionally need to store and access the profile for every existing entity in the entity class (e.g. every ATM being considered in the problem). Limitations of computer resources require that such a large amount of information is maintained in a disk-resident profile database, external to the computer program forming the core of the event probability prediction system. This leads to several issues in the development and running of the event probability prediction system:
  • 1) It is necessary to create an interface between the mathematical model and the external database containing the profiles during development of the event probability prediction system.
  • 2) It is necessary to create an interface between the mathematical model and the external database containing the profiles in the production environment in which the system will ultimately be used.
  • 3) The system's capacity to process transactions may be severely limited due to the required interface with an external database.
  • Each of these issues could be a potential problem making the development and/or installation of the event probability prediction system infeasible.
  • Furthermore, in addition to the strain a traditional system places on the computer resources available, such a system may not allow the user to easily identify those entities which display a behavior of interest, particularly when multiple entity classes are being profiled to provide a multi-dimensional view of the data. Effective event probability prediction requires that only the minimum set of entities, a set whose membership varies over time, be profiled and maintained in a data store. It would be advantageous to provide a system and method that solves any of or any combination of the problems disclosed hereinabove.
  • SUMMARY
  • This document presents a new computer-based event probability prediction system and method that has two main advantages over previous systems. First, the new system uses computer resources more efficiently which allows it to achieve faster execution times and simplified implementation. Second, the new system allows for the identification and reporting of those entities which display anomalous behavior when viewed across multiple dimensions of the data and within a higher risk set of entities. The core of the system and method is a specialized profiling that efficiently maintains historical information only on a small number of entities rather than on all of the entities in a particular entity class. The resulting type of profile, a Concise Profile, uses Automated Entity Identification (AEI) which allows a large disk-resident profile database to be replaced with a small dynamic table stored in memory. A Concise Profile consists of 1) an online-updated, importance-ranked AEI table that contains the profile records for a concise subset of entities and 2) a recycling algorithm, based on an objective function related to the probability of a particular event, that determines the dynamic membership of the table. The system and method further calculates statistics on the AEI table to identify outliers, entities which exhibit anomalous behavior, to be reported to users of the system independent of the main score(s).
  • In one aspect, a computer-implemented method includes steps of defining a first subset of entities belonging to one or more entity classes, and constructing at least one historical profile for each entity in the subset of entities based on a set of possible outcomes of transaction behavior of each entity in the first subset of entities. Based on the historical profiles, a second subset of entities having transaction behavior associated with a transaction is selected, the transaction behavior being predictive of at least one targeted outcome from the set of possible outcomes. The method further includes the step of redefining the first subset of entities with the second subset of entities.
  • The details of one or more embodiments are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other aspects will now be described in detail with reference to the following drawings.
  • FIG. 1 shows an overview of the flow of data records through the event probability prediction system.
  • FIG. 2 shows the steps involved in updating the AEI table for the Concise Profile.
  • FIG. 3 shows a possible configuration of the system in which a feedback loop is added.
  • FIG. 4 shows a possible configuration of the system in which the Concise Profile variables are used to augment the output score of a base model.
  • FIG. 5 shows a possible configuration of the system in which the Concise Profile variables are not blended with the base model output, but are used as input to the base model.
  • FIG. 6 shows a possible configuration of the system in which the Concise Profile variables are used to augment a base model and the output of the base model is used as additional input for the updating of the AEI table.
  • FIG. 7 shows a possible configuration of the system identical to that shown in FIG. 4 except for the addition of feedback loops.
  • FIG. 8 shows a possible configuration of the system in which the Concise Profile variables are used to augment a base model only when the base model score lies in a desired range.
  • FIG. 9 shows a possible configuration of the system identical to that shown in FIG. 8 except for the addition of feedback loops.
  • FIG. 10 shows a table illustrating average transactions per hour of specific entities.
  • Like reference symbols in the various drawings indicate like elements.
  • DETAILED DESCRIPTION
  • This document describes a computer-based, realtime system for event probability prediction implementing efficient profiling technology which minimizes required computer resources and allows for the identification of entities exhibiting anomalous behavior.
  • The invention applies to event probability prediction in general but to aid in the description the details of the invention are discussed below using a fraud detection system as a specific instance of the invention In the context of a fraud detection system, the system calculates, for example, the probability that a financial transaction is fraudulent.
  • In contrast to existing systems for fraud detection, the system described here uses a specialized profiling technology, called a Concise Profile, to efficiently maintain historical information only on a small number of entities at any given time rather than on all of the entities in an entity class. At the heart of the concept of a Concise Profile is Automated Entity Identification (AEI), which provides a way to replace a large, disk-resident profile database with a small dynamic table, of fixed maximum size, stored in memory rather than in an external database.
  • Whereas existing fraud detection systems maintain historical information for every entity in an entity class, a Concise Profile provides an online-updated, importance-ranked AEI table that contains profile records for a concise subset of entities whose dynamic membership is determined by a recycling algorithm, described in more detail below. This recycling algorithm is based on an objective function which uses criteria that are related to the probability that the transaction is associated with fraud.
  • Conceptually, each row in the AEI table corresponds to a single entity and contains two types of information: 1) information used to determine the rank of the entity in the table and 2) Concise Profile variables. The recycling algorithm ensures that entities exhibiting the behavior of interest (e.g. apparent fraud) have a consistently high rank in the AEI table, while other entities have a lower rank or may be removed from the table.
  • In addition to the benefits of reduced computer resource usage due to the maintenance of profiles for only a subset of all entities, the AEI table allows the invention to achieve something traditional systems are unable to do easily. The entities which are represented in the AEI table at any given time form a carefully selected, high-risk subset of the entire entity class by virtue of the recycling algorithm. One can compute statistics on this concise, ranked list of entity profiles to determine which entities, if any, are outliers in their behavior compared to all other entities represented on the list. In this sense the system provides the identities of those entities which exhibit anomalous (i.e. risky) behavior compared to other, already high-risk entities. As they do not require a large share of the computer resources, many Concise Profiles can be used simultaneously in a single fraud detection system. These profiles can be constructed to monitor many different entity classes and even different aspects of a single entity class by using a variety of recycling algorithms. The system can use information from the various AEI tables to detect anomalies that may only be visible when viewed from multiple dimensions (i.e. using multiple Concise Profiles). Furthermore, once an anomaly is detected, the identity of the corresponding entity is known and can be used in a separate, dedicated system to handle such anomalies or can be included in a report sent to a human fraud analyst. This ability to detect, identify, and report in real time or near real time on the entities which exhibit anomalous behavior when viewed from several dimensions gives the invention a significant advantage over traditional fraud detection systems.
  • An overview of the flow of data records through an example fraud detection system is shown in FIG. 1. Each new data record, received sequentially, corresponds to a single transaction involving the entity classes being used in the Concise Profiles. At least one Concise Profile table is required, but multiple Concise Profile tables, which each have a limited view into fraud, are required if multiple entity classes are being profiled as indicated in FIG. 1 and in other figures. First, a new data record 102 (e.g. an ATM transaction) to be evaluated for its likelihood of fraud enters the system. At step 104 the data in the record is used to update the AEI table for the entity class implemented as Concise Profile 1. In the case of multiple Concise Profiles, each one corresponds to a different entity class and each has a corresponding AEI table. All AEI tables are updated using information in the data record. The values of the variables stored in the AEI tables for the entities involved in the current transaction are output to the Concise Profile model at step 106 which uses the variables to evaluate (score) the record.
  • At step 108 the score and the input data record are passed to a case management system in which human fraud experts determine whether the record is actually a fraudulent record or a non-fraudulent record. The case management system allows the fraud expert to access other data sources including communicating with the legitimate person who is authorized to conduct the transaction (e.g. the credit card holder).
  • FIG. 2 illustrates the steps involved in updating the AEI table for the Concise Profile. After a new record 202 is presented to the system, at step 204 the system reduces the importance rating of each row in the AEI table. These importance ratings are used to rank order the entities represented in the table. The importance rating update procedure follows a mathematical formula which can be symbolized by the equation.

  • f new =g(f old , X)
  • where fnew represents the new importance rating of a particular row in the table, fold represents the importance rating that takes into account all records up to but not including the new record, X represents the collection of information from the new record that may be useful in updating the importance rating, and g( ) represents the function whose output is the new importance rating.
  • As a simple example of an importance rating, the recycling algorithm may ensure that entities occurring in frequent or recent transactions have a consistently high rank in the AEI table, while other entities have a lower rank. In this case entities which occur rarely in transactions would have rare, short-lived appearances in the table. The importance rating then becomes equivalent to a frequency. To achieve this behavior, the updated frequency for each entity in the table can be recomputed on every input transaction according to the equation.

  • f i =α×f j−1j
  • where fj and fj−1 are the values of the decayed frequency for a particular entity in the table after the j'th and (J−1)'th transactions, α is a value between zero and one and is used to reduce all of the importance ratings in the table (step 204), and βj is zero if the j'th transaction did not involve the particular entity for which the decayed frequency is being computed or one if the j'th transaction did involve the particular entity for which the decayed frequency is being computed.
  • Updating the frequency in such a way that the most recent or frequent entities maintain high ranks may be beneficial, for example, when the system is attempting to detect frauds which manifest themselves as bursts of activity at particular Automatic Teller Machines (ATMs). In this scenario, the frequency can be related to different objective functions such as the number of transactions involving a card used for the first-time at the ATM, the number of transactions in which the amount is greater than some threshold, the number of transactions with a base model score greater than some threshold, etc.
  • On the other hand, one can imagine updating the frequencies such that the least frequently transacting entities maintain their high ranks. This would be useful for any fraud detection system in which the occurrences of the entities involved mostly follow some regular patterns which involve regular time intervals. A bank customer may regularly write checks every month to pay bills. These transactions would correspond to entities with low ranks in the AEI table, thus allowing the model to concentrate on the rarer transactions which are more likely to be fraudulent. Any other importance rating may be used in place of the frequency as needed to ensure that entities displaying the behavior of interest are kept in the AEI table.
  • At step 206 the system calculates a key value which uniquely identifies the entity within the entity class. At step 208 the system uses the key value to determine whether or not the entity is already represented in the AEI table.
  • If the entity is not already represented in the AEI table, then it becomes a candidate to be added with its importance rating set to a predetermined initial value. This addition occurs in one of the following two ways depending on whether or not the table is already full (i.e. all available rows are occupied), a determination made in step 210. If the table is full then in step 212 the system determines whether the initial importance rating is greater than the importance rating of the lowest-ranked entity in the table. If this condition is not satisfied, then at step 214 the system outputs the default values of the Concise Profile variables and the new entity will not have its profile record added to the table. It is possible to configure the system in such a way that the condition is always satisfied, so entities not found in the table always have their profile record added to the table. If the condition is satisfied then at step 216 the system removes the profile record for the lowest ranked entity in the table, which is the entity having the lowest frequency among all entities represented in the table. This step, together with step 204, ensures that profile records for entities which have low importance ratings will be replaced in the table by profile records for entities from more recent transactions. At step 218 the profile record for the new entity is added to the table with the initial importance rating value. If at step 210 it is determined that the table is not already full, then the system proceeds directly to step 218 in which the profile record for the new entity is added to the table with the initial importance rating value. At step 220 the Concise Profile variables defined for this entity class are calculated for this entity using information in the record 202.
  • If the profile record for the entity already exists in the AEI table, then from step 208 the system proceeds directly to step 222 in which the importance rating of the entity is increased. This step ensures that an entity with important behavior maintains a high rank in the table. At step 224 the Concise Profile variables defined for this entity class are updated for this entity using information in the record 202.
  • After the Concise Profile variables for the entity are either calculated for the first time (step 220) or updated (step 224), at step 226 the system re-ranks the entities represented in the table based on importance rating. At step 228 the system outputs the values of the Concise Profile variables for the entity.
  • One example of an entity that could be used in a fraud detection system is an ATM. For example, a criminal with a large number of counterfeit/stolen debit cards, each corresponding to a separate customer account, may successively use the cards at a single ATM to remove money from each account. This type of fraudulent behavior would cause the affected ATM to be highly ranked in the AEI table (assuming an importance rating update equation that emphasizes recent or frequent transactions) which would allow the fraud detection system at step 104 to maintain constantly updated Concise Profile variables describing the behavior of this particular ATM. Wisely constructed variables chosen to reflect differences between patterns of fraudulent behavior and patterns of non-fraudulent behavior would be evaluated by the Concise Profile model (step 106) and produce a score consistent with the transactions at this ATM being fraudulent. The advantages of the proposed fraud detection system are evident in this application when one considers that a traditional system might need to maintain profiles on hundreds of thousands of ATMs whereas the AEI table in the proposed system only needs to store information on a few hundred ATMs at any one time to achieve significant fraud detection capability. Furthermore, potential users of a system (e.g. banks) may not be able to afford maintaining a full profile database containing all ATMs in addition to the traditional full profile database containing all bank customers. To reduce costs users may be forced to choose a system which contains no ATM profiling, thereby losing sight of any ATM dynamics and restricting themselves to a one-dimensional, card-holder view of the data.
  • If the fraud patterns are static there is no need to create a system which monitors and reacts to changing patterns of fraud. In the real world in which the system must operate, however, fraud may be dynamic, manifesting itself in different ways at different times. FIG. 3 shows a possible configuration of the system identical to that shown in FIG. 1 except for the addition of a feedback loop in which information flows from case management at step 308 directly to the update of the AEI table at step 304. In the context of a fraud detection system being described here, the purpose of the feedback is to allow the system to rapidly incorporate new information on changing fraud patterns. The feedback consists of a confirmed fraud/nonfraud tag, the data for the record corresponding to the tag, and the model score for the record. The feedback improves the performance of the system in environments containing a significant amount of dynamic fraud. One of the uses of this technique is to update risk tables of different entities to reflect the most current fraud risk in the production environment.
  • An existing fraud detection system (one not using Concise Profiles) may contain one or more mathematical models which calculate a score representing the likelihood that the new data record corresponds to a fraudulent transaction. If these models, represented by the process labeled Base Model at step 404 in FIG. 4, already achieve a relatively high level of fraud detection then it may make sense to keep them in the system, using the Concise Profile variables to augment the base model output. This is depicted in FIG. 4. The new data record 402 is used as input both to the base model at step 404 and to the AEI table update at step 406. The output from step 404 includes the scores from each of those models as well as the values of the variables created by those models. The Concise Profile variables from step 406 are blended (mathematically combined) at step 408 with the output from the base model. In this way the system produces a final score which is sent to the case management step 410. The final blended score can more accurately estimate the likelihood of fraud than the base model score alone. For example, the base model may maintain profiles about individual bank customers while a Concise Profile may maintain historical information about individual ATMs. This difference enables the Concise Profile variables to capture a complementary dimension of the data which is likely to increase the performance of the final score over that of the base model.
  • The base model may be sufficiently complex and flexible that it can handle the Concise Profile variables being used at its input. In this situation, depicted in FIG. 5, the input to the base model consists of the new data record as well as all Concise Profile variables. This has the potential to create a high performance system (i.e. one attaining a high level of fraud detection) because all of the available information is accessible to the mathematical model at the same time. One drawback, however, is that the internal operation of the base model necessarily changes if the Concise Profile variables contain information which help to discriminate between fraud and nonfraud records. If this change in the base model is not desired or not feasible, then the configuration of FIG. 4 described above may be preferred. In the system of FIG. 4 the base model remains unchanged by the addition of the Concise Profile variables into the system.
  • On the other hand, one can consider an alternative modification of the system in FIG. 4. The base model remains unchanged but its output is used to create one or more of the Concise Profile variables. This is depicted in FIG. 6 in which the output of step 604 is used at the input to step 606. The Concise Profiles are able to incorporate into their variables the score or scores from the base model as well as the variables created by the base model.
  • When the Concise Profiles are used to augment a base model it may still be beneficial to incorporate feedback into the updating of the AEI tables, for the same reasons as those mentioned above in the discussion in reference to FIG. 3. Whether the Concise Profiles form the core of the system or augment a base model, the purpose of the feedback is to allow the system to rapidly incorporate new information on changing fraud patterns. FIG. 7 shows a configuration in which feedback is used to update the Concise Profile variables which are then blended with the base model output.
  • It may be desirable to configure the fraud detection system such that the Concise Profile variables are used to augment a base model only under certain conditions. The final score sent to the case management step could be the base model score itself except when this score is in a desired range. The desired range can be set, for example, to be the score range in which business operating points are set and where the accuracy of the predictions are the most crucial. This configuration of the system is illustrated in FIG. 8. It is similar to the system described in reference to FIG. 4 except for the addition of the decision step 808. At step 808 the base model score is examined. If the score is in the desired range then the base model output is sent to step 810 and blended with the Concise Profile variables. In this situation the score sent to the case management step 812 is a blending of the base model output and the Concise Profile variables. If, however, the base model score is not in the desired range then the score sent to the case management step 812 is the unmodified base model score. In this configuration of the system, the Concise Profile variables are able to improve the performance of the fraud detection system by augmenting the base model only when augmentation can be most beneficial.
  • FIG. 9 shows another system that is similar to the system described in reference to FIG. 4 and FIG. 8, except for the addition of the decision step 908 and a feedback loop. At step 908 the base model score is examined. If the score is in the desired range then the base model output is sent to step 910 and blended with the Concise Profile variables. In this situation the score sent to the case management step 912 is a blending of the base model output and the Concise Profile variables. If, however, the base model score is not in the desired range then the score sent to the case management step 912 is the unmodified base model score. When a feedback loop is added to the system, the result is the system illustrated in FIG. 9. Many other system configurations of various combinations of the main features described above (e.g. multiple Concise Profiles, feedback loops, blending based on a score range, concise Profile variables used as input to base model, base model output used as input to AEI table updates, etc.) can be implemented.
  • In any of the configurations described above, specific statistics calculated on the subset of entities represented in the AEI tables can be used to identify entities exhibiting anomalous behavior. We refer to this analysis on the AEI table as Automatic Identity Identification (AII). Consider the example of using the ATM entity class in a fraud detection system. The AEI table will contain a small subset of ATMs deemed riskier than other ATMs in the data. If the average number of transactions per hour with amount greater than $300 at a particular ATM is indicative of fraud, then this quantity can be calculated across all entities in the AEI table. The table of FIG. 10 shows a simple example in which most of the ATMs have a value in the range two to four of this quantity. One of the ATMs, however, has a value 15.4, much larger than the average value. If outliers such as this have a value which is greater than, for example, ten standard deviations away from the mean value of the statistic being calculated, then the system has identified (hence the term Automatic Identity Identification) an extreme outlier (i.e. an ATM exhibiting the riskiest behavior) and can report it to a human fraud analyst or police authorities for further investigation or immediate action. This type of identification and reporting of outliers would be difficult to achieve for a traditional fraud detection system that uses a full profile database given the computational expense of running regular queries on the full set of ATMs and having only limited views of the fraud characteristics. Doing Automatic Identity Identification analysis on several small concise profile tables enables fast and efficient detection of outliers at a variety of dimensions associated with the fraud behaviors.
  • Some or all of the functional operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of them. Embodiments of the invention can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium, e.g., a machine readable storage device, a machine readable storage medium, a memory device, or a machine-readable propagated signal, for execution by, or to control the operation of, data processing apparatus.
  • The term “data processing apparatus” encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of them. A propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode information for transmission to suitable receiver apparatus.
  • A computer program (also referred to as a program, software, an application, a software application, a script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
  • The processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
  • Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to, a communication interface to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • Moreover, a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, to name just a few. Information carriers suitable for embodying computer program instructions and data include all forms of non volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
  • To provide for interaction with a user, embodiments of the invention can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • Embodiments of the invention can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the invention, or any combination of such back end, middleware, or front end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.
  • The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • Certain features which, for clarity, are described in this specification in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features which, for brevity, are described in the context of a single embodiment, may also be provided in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
  • Particular embodiments of the invention have been described. Other embodiments are within the scope of the following claims. For example, the steps recited in the claims can be performed in a different order and still achieve desirable results. In addition, embodiments of the invention are not limited to database architectures that are relational; for example, the invention can be implemented to provide indexing and archiving methods and systems for databases built on models other than the relational model, e.g., navigational databases or object oriented databases, and for databases having records with complex attribute structures, e.g., object oriented programming objects or markup language documents. The processes described may be implemented by applications specifically performing archiving and retrieval functions or embedded within other applications.

Claims (17)

1. A computer-implemented method comprising:
defining a first subset of entities belonging to one or more entity classes;
constructing at least one historical profile for each entity in the subset of entities based on a set of possible outcomes of transaction behavior of each entity in the first subset of entities;
based on the historical profiles, selecting a second subset of entities having transaction behavior associated with a transaction, the transaction behavior being predictive of at least one targeted outcome from the set of possible outcomes; and
redefining the first subset of entities with the second subset of entities.
2. The computer-implemented method of claim 1, wherein the targeted outcome is selected from the set of possible outcomes that consists of a desirable outcome and an undesirable outcome.
3. The computer-implemented method of claim 1, wherein the targeted outcome includes fraud in connection with the transaction behavior.
4. The computer-implemented method of claim 1, wherein at least one entity class includes automatic teller machines.
5. The computer-implemented method of claim 1, further comprising:
generating at least one score related to the transaction based on one or more mathematical models; and
combining the at least one score with information of the transaction behavior to generate a probability of the targeted outcome.
5. The computer-implemented method of claim 1, further comprising:
for each transaction, generating at least one score related to the transaction based on one or more mathematical models; and combining the at least one score with information from historical profiles for the entities involved in the transaction to produce a more accurate score.
6. The computer-implemented method of claim 5, wherein the historical profiles are used only if the at least one score is within a predetermined range of values that indicate a high probability of the targeted outcome.
7. The computer-implemented method of claim 1, further comprising generating an estimate of the probability of the targeted outcome based only on the historical profiles.
8. The computer-implemented method of claim 1, in which the values in the historical profile for an entity are computed using information from transaction records that involved that entity.
9. The computer-implemented method of claim 8, in which the values in the historical profile for an entity are computed using input variables and output scores computed for the transaction records by one or more mathematical models.
10. The computer-implemented method of claim 1, in which some or all of the values in the historical profile for an entity are computed using feedback of transaction records that involve that entity and that have been delayed until the actual outcome for that transaction is known.
11. The computer-implemented method in which the transaction behavior being predictive of at least one targeted outcome from the set of possible outcomes is a high value for a decayed frequency which selects entities with recent frequent transactions, where the decayed frequency for each entity represented in the table is recomputed on every input transaction according to the equation

f i =α×f j−1j
where fj and fj−1 are the values of the decayed frequency for a particular entity represented in the table after the j'th and (j−1)'th transactions, α is a value between zero and one, and βj is zero if the j'th transaction did not involve the particular entity for which the decayed frequency is being computed or one if the j'th transaction did involve the particular entity for which the decayed frequency is being computed.
12. The computer-implemented method 1, further comprising monitoring the historical profiles for the entities to find entities for which the behavior is so significantly different than normal as to indicate a high probability that the entity is involved in a fraud process that is to be reported to humans.
13. A computer-implemented system having a processor that is responsive to program code, the system comprising:
code to define a first subset of entities belonging to one or more entity classes;
code to construct at least one historical profile for each entity in the subset of entities based on a set of possible outcomes of transaction behavior of each entity in the first subset of entities;
based on the historical profiles, code to select a second subset of entities having transaction behavior associated with a transaction, the transaction behavior being predictive of at least one targeted outcome from the set of possible outcomes; and
code to redefine the first subset of entities with the second subset of entities.
14. The computer-implemented system of claim 13, wherein the targeted outcome is selected from the set of possible outcomes that consists of a desirable outcome and an undesirable outcome.
15. The computer-implemented system of claim 13, wherein the targeted outcome includes fraud in connection with the transaction behavior.
16. The computer-implemented system of claim 13, wherein at least one entity class includes automatic teller machines.
US12/110,261 2008-04-25 2008-04-25 Automated entity identification for efficient profiling in an event probability prediction system Active 2030-07-22 US8121962B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US12/110,261 US8121962B2 (en) 2008-04-25 2008-04-25 Automated entity identification for efficient profiling in an event probability prediction system
US13/399,067 US8332338B2 (en) 2008-04-25 2012-02-17 Automated entity identification for efficient profiling in an event probability prediction system
US13/710,423 US8645301B2 (en) 2008-04-25 2012-12-10 Automated entity identification for efficient profiling in an event probability prediction system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/110,261 US8121962B2 (en) 2008-04-25 2008-04-25 Automated entity identification for efficient profiling in an event probability prediction system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/399,067 Continuation US8332338B2 (en) 2008-04-25 2012-02-17 Automated entity identification for efficient profiling in an event probability prediction system

Publications (2)

Publication Number Publication Date
US20090271343A1 true US20090271343A1 (en) 2009-10-29
US8121962B2 US8121962B2 (en) 2012-02-21

Family

ID=41215978

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/110,261 Active 2030-07-22 US8121962B2 (en) 2008-04-25 2008-04-25 Automated entity identification for efficient profiling in an event probability prediction system
US13/399,067 Active US8332338B2 (en) 2008-04-25 2012-02-17 Automated entity identification for efficient profiling in an event probability prediction system
US13/710,423 Active US8645301B2 (en) 2008-04-25 2012-12-10 Automated entity identification for efficient profiling in an event probability prediction system

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/399,067 Active US8332338B2 (en) 2008-04-25 2012-02-17 Automated entity identification for efficient profiling in an event probability prediction system
US13/710,423 Active US8645301B2 (en) 2008-04-25 2012-12-10 Automated entity identification for efficient profiling in an event probability prediction system

Country Status (1)

Country Link
US (3) US8121962B2 (en)

Cited By (167)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100036672A1 (en) * 2008-08-08 2010-02-11 Xiang Li Adaptive Outlier Model For Fraud Detection
US20130036119A1 (en) * 2011-08-01 2013-02-07 Qatar Foundation Behavior Based Record Linkage
US20140165184A1 (en) * 2012-12-12 2014-06-12 Daniel H. Lange Electro-Biometric Authentication
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8903717B2 (en) 2013-03-15 2014-12-02 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8924389B2 (en) 2013-03-15 2014-12-30 Palantir Technologies Inc. Computer-implemented systems and methods for comparing and associating objects
US9058315B2 (en) 2011-08-25 2015-06-16 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US20150180894A1 (en) * 2013-12-19 2015-06-25 Microsoft Corporation Detecting anomalous activity from accounts of an online service
US9100428B1 (en) 2014-01-03 2015-08-04 Palantir Technologies Inc. System and method for evaluating network threats
US9105000B1 (en) 2013-12-10 2015-08-11 Palantir Technologies Inc. Aggregating data from a plurality of data sources
US9129219B1 (en) 2014-06-30 2015-09-08 Palantir Technologies, Inc. Crime risk forecasting
US20150356526A1 (en) * 2014-06-07 2015-12-10 Mark Christmas Intuitive Interactive Automated Video Teller Machine
US9275069B1 (en) 2010-07-07 2016-03-01 Palantir Technologies, Inc. Managing disconnected investigations
US20160132887A1 (en) * 2014-11-10 2016-05-12 Mastercard International Incorporated Systems and methods for detecting compromised automated teller machines
US9348499B2 (en) 2008-09-15 2016-05-24 Palantir Technologies, Inc. Sharing objects that rely on local resources with outside servers
US9348851B2 (en) 2013-07-05 2016-05-24 Palantir Technologies Inc. Data quality monitors
US9348920B1 (en) 2014-12-22 2016-05-24 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US9390086B2 (en) 2014-09-11 2016-07-12 Palantir Technologies Inc. Classification system with methodology for efficient verification
US9392008B1 (en) 2015-07-23 2016-07-12 Palantir Technologies Inc. Systems and methods for identifying information related to payment card breaches
US9424669B1 (en) 2015-10-21 2016-08-23 Palantir Technologies Inc. Generating graphical representations of event participation flow
US9430507B2 (en) 2014-12-08 2016-08-30 Palantir Technologies, Inc. Distributed acoustic sensing data analysis system
US9454281B2 (en) 2014-09-03 2016-09-27 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US9483546B2 (en) 2014-12-15 2016-11-01 Palantir Technologies Inc. System and method for associating related records to common entities across multiple lists
US9485265B1 (en) 2015-08-28 2016-11-01 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9501761B2 (en) 2012-11-05 2016-11-22 Palantir Technologies, Inc. System and method for sharing investigation results
US9501851B2 (en) 2014-10-03 2016-11-22 Palantir Technologies Inc. Time-series analysis system
US9501552B2 (en) 2007-10-18 2016-11-22 Palantir Technologies, Inc. Resolving database entity information
US9514414B1 (en) 2015-12-11 2016-12-06 Palantir Technologies Inc. Systems and methods for identifying and categorizing electronic documents through machine learning
US9589014B2 (en) 2006-11-20 2017-03-07 Palantir Technologies, Inc. Creating data in a data store using a dynamic ontology
US9619557B2 (en) 2014-06-30 2017-04-11 Palantir Technologies, Inc. Systems and methods for key phrase characterization of documents
US9639580B1 (en) 2015-09-04 2017-05-02 Palantir Technologies, Inc. Computer-implemented systems and methods for data management and visualization
US9652139B1 (en) 2016-04-06 2017-05-16 Palantir Technologies Inc. Graphical representation of an output
US20170154276A1 (en) * 2015-11-27 2017-06-01 Tata Consultancy Services Limited Event prediction system and method
US9671776B1 (en) 2015-08-20 2017-06-06 Palantir Technologies Inc. Quantifying, tracking, and anticipating risk at a manufacturing facility, taking deviation type and staffing conditions into account
US9715518B2 (en) 2012-01-23 2017-07-25 Palantir Technologies, Inc. Cross-ACL multi-master replication
US9727560B2 (en) 2015-02-25 2017-08-08 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US9727622B2 (en) 2013-12-16 2017-08-08 Palantir Technologies, Inc. Methods and systems for analyzing entity performance
US9760556B1 (en) 2015-12-11 2017-09-12 Palantir Technologies Inc. Systems and methods for annotating and linking electronic documents
US9767172B2 (en) 2014-10-03 2017-09-19 Palantir Technologies Inc. Data aggregation and analysis system
US9785317B2 (en) 2013-09-24 2017-10-10 Palantir Technologies Inc. Presentation and analysis of user interaction data
US9792020B1 (en) 2015-12-30 2017-10-17 Palantir Technologies Inc. Systems for collecting, aggregating, and storing data, generating interactive user interfaces for analyzing data, and generating alerts based upon collected data
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9836523B2 (en) 2012-10-22 2017-12-05 Palantir Technologies Inc. Sharing information between nexuses that use different classification schemes for information access control
US9852205B2 (en) 2013-03-15 2017-12-26 Palantir Technologies Inc. Time-sensitive cube
US9864493B2 (en) 2013-10-07 2018-01-09 Palantir Technologies Inc. Cohort-based presentation of user interaction data
US9870389B2 (en) 2014-12-29 2018-01-16 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US9875293B2 (en) 2014-07-03 2018-01-23 Palanter Technologies Inc. System and method for news events detection and visualization
US9886467B2 (en) 2015-03-19 2018-02-06 Plantir Technologies Inc. System and method for comparing and visualizing data entities and data entity series
US9886525B1 (en) 2016-12-16 2018-02-06 Palantir Technologies Inc. Data item aggregate probability analysis system
US9891808B2 (en) 2015-03-16 2018-02-13 Palantir Technologies Inc. Interactive user interfaces for location-based data analysis
US9898335B1 (en) 2012-10-22 2018-02-20 Palantir Technologies Inc. System and method for batch evaluation programs
US9946738B2 (en) 2014-11-05 2018-04-17 Palantir Technologies, Inc. Universal data pipeline
US9953445B2 (en) 2013-05-07 2018-04-24 Palantir Technologies Inc. Interactive data object map
US20180121922A1 (en) * 2016-10-28 2018-05-03 Fair Isaac Corporation High resolution transaction-level fraud detection for payment cards in a potential state of fraud
US9965534B2 (en) 2015-09-09 2018-05-08 Palantir Technologies, Inc. Domain-specific language for dataset transformations
US9984133B2 (en) 2014-10-16 2018-05-29 Palantir Technologies Inc. Schematic and database linking system
US9984428B2 (en) 2015-09-04 2018-05-29 Palantir Technologies Inc. Systems and methods for structuring data from unstructured electronic data files
US9996229B2 (en) 2013-10-03 2018-06-12 Palantir Technologies Inc. Systems and methods for analyzing performance of an entity
US9996236B1 (en) 2015-12-29 2018-06-12 Palantir Technologies Inc. Simplified frontend processing and visualization of large datasets
US9996595B2 (en) 2015-08-03 2018-06-12 Palantir Technologies, Inc. Providing full data provenance visualization for versioned datasets
US10007674B2 (en) 2016-06-13 2018-06-26 Palantir Technologies Inc. Data revision control in large-scale data analytic systems
CN108229964A (en) * 2017-12-25 2018-06-29 同济大学 Trading activity profile is built and authentication method, system, medium and equipment
US10044836B2 (en) 2016-12-19 2018-08-07 Palantir Technologies Inc. Conducting investigations under limited connectivity
US10061828B2 (en) 2006-11-20 2018-08-28 Palantir Technologies, Inc. Cross-ontology multi-master replication
US10068199B1 (en) 2016-05-13 2018-09-04 Palantir Technologies Inc. System to catalogue tracking data
US10089289B2 (en) 2015-12-29 2018-10-02 Palantir Technologies Inc. Real-time document annotation
US10103953B1 (en) 2015-05-12 2018-10-16 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10114884B1 (en) 2015-12-16 2018-10-30 Palantir Technologies Inc. Systems and methods for attribute analysis of one or more databases
US10127289B2 (en) 2015-08-19 2018-11-13 Palantir Technologies Inc. Systems and methods for automatic clustering and canonical designation of related data in various data structures
US10133783B2 (en) 2017-04-11 2018-11-20 Palantir Technologies Inc. Systems and methods for constraint driven database searching
US10135863B2 (en) 2014-11-06 2018-11-20 Palantir Technologies Inc. Malicious software detection in a computing system
US10133588B1 (en) 2016-10-20 2018-11-20 Palantir Technologies Inc. Transforming instructions for collaborative updates
US10133621B1 (en) 2017-01-18 2018-11-20 Palantir Technologies Inc. Data analysis system to facilitate investigative process
US10140664B2 (en) * 2013-03-14 2018-11-27 Palantir Technologies Inc. Resolving similar entities from a transaction database
US10176482B1 (en) 2016-11-21 2019-01-08 Palantir Technologies Inc. System to identify vulnerable card readers
US10180929B1 (en) 2014-06-30 2019-01-15 Palantir Technologies, Inc. Systems and methods for identifying key phrase clusters within documents
US10180977B2 (en) 2014-03-18 2019-01-15 Palantir Technologies Inc. Determining and extracting changed data from a data source
US10216811B1 (en) 2017-01-05 2019-02-26 Palantir Technologies Inc. Collaborating using different object models
US10223429B2 (en) 2015-12-01 2019-03-05 Palantir Technologies Inc. Entity data attribution using disparate data sets
US10229284B2 (en) 2007-02-21 2019-03-12 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US10235533B1 (en) 2017-12-01 2019-03-19 Palantir Technologies Inc. Multi-user access controls in electronic simultaneously editable document editor
US10248722B2 (en) 2016-02-22 2019-04-02 Palantir Technologies Inc. Multi-language support for dynamic ontology
US10249033B1 (en) 2016-12-20 2019-04-02 Palantir Technologies Inc. User interface for managing defects
US10275778B1 (en) 2013-03-15 2019-04-30 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures
US10311440B2 (en) * 2016-05-24 2019-06-04 International Business Machines Corporation Context-aware deterrent and response system for financial transaction device security
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US10324609B2 (en) 2016-07-21 2019-06-18 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10362133B1 (en) 2014-12-22 2019-07-23 Palantir Technologies Inc. Communication data processing architecture
US10360238B1 (en) 2016-12-22 2019-07-23 Palantir Technologies Inc. Database systems and user interfaces for interactive data association, analysis, and presentation
US10373099B1 (en) 2015-12-18 2019-08-06 Palantir Technologies Inc. Misalignment detection system for efficiently processing database-stored data and automatically generating misalignment information for display in interactive user interfaces
US10402742B2 (en) 2016-12-16 2019-09-03 Palantir Technologies Inc. Processing sensor logs
US10423582B2 (en) 2011-06-23 2019-09-24 Palantir Technologies, Inc. System and method for investigating large amounts of data
US10430444B1 (en) 2017-07-24 2019-10-01 Palantir Technologies Inc. Interactive geospatial map and geospatial visualization systems
US10437450B2 (en) 2014-10-06 2019-10-08 Palantir Technologies Inc. Presentation of multivariate data on a graphical user interface of a computing system
US10444941B2 (en) 2015-08-17 2019-10-15 Palantir Technologies Inc. Interactive geospatial map
US10452678B2 (en) 2013-03-15 2019-10-22 Palantir Technologies Inc. Filter chains for exploring large data sets
US10452651B1 (en) 2014-12-23 2019-10-22 Palantir Technologies Inc. Searching charts
US10484407B2 (en) 2015-08-06 2019-11-19 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US10504067B2 (en) 2013-08-08 2019-12-10 Palantir Technologies Inc. Cable reader labeling
US10509844B1 (en) 2017-01-19 2019-12-17 Palantir Technologies Inc. Network graph parser
US10515109B2 (en) 2017-02-15 2019-12-24 Palantir Technologies Inc. Real-time auditing of industrial equipment condition
US10545982B1 (en) 2015-04-01 2020-01-28 Palantir Technologies Inc. Federated search of multiple sources with conflict resolution
US10545975B1 (en) 2016-06-22 2020-01-28 Palantir Technologies Inc. Visual analysis of data using sequenced dataset reduction
US10552002B1 (en) 2016-09-27 2020-02-04 Palantir Technologies Inc. User interface based variable machine modeling
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US10563990B1 (en) 2017-05-09 2020-02-18 Palantir Technologies Inc. Event-based route planning
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US10579647B1 (en) 2013-12-16 2020-03-03 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10581954B2 (en) 2017-03-29 2020-03-03 Palantir Technologies Inc. Metric collection and aggregation for distributed software services
US10585883B2 (en) 2012-09-10 2020-03-10 Palantir Technologies Inc. Search around visual queries
US10606872B1 (en) 2017-05-22 2020-03-31 Palantir Technologies Inc. Graphical user interface for a database system
US10628834B1 (en) 2015-06-16 2020-04-21 Palantir Technologies Inc. Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces
US10636097B2 (en) 2015-07-21 2020-04-28 Palantir Technologies Inc. Systems and models for data analytics
US10678860B1 (en) 2015-12-17 2020-06-09 Palantir Technologies, Inc. Automatic generation of composite datasets based on hierarchical fields
US10691662B1 (en) 2012-12-27 2020-06-23 Palantir Technologies Inc. Geo-temporal indexing and searching
US10698938B2 (en) 2016-03-18 2020-06-30 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US10706434B1 (en) 2015-09-01 2020-07-07 Palantir Technologies Inc. Methods and systems for determining location information
US10706056B1 (en) 2015-12-02 2020-07-07 Palantir Technologies Inc. Audit log report generator
US10719188B2 (en) 2016-07-21 2020-07-21 Palantir Technologies Inc. Cached database and synchronization system for providing dynamic linked panels in user interface
US10721262B2 (en) 2016-12-28 2020-07-21 Palantir Technologies Inc. Resource-centric network cyber attack warning system
US10719527B2 (en) 2013-10-18 2020-07-21 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US10728262B1 (en) 2016-12-21 2020-07-28 Palantir Technologies Inc. Context-aware network-based malicious activity warning systems
US10726507B1 (en) 2016-11-11 2020-07-28 Palantir Technologies Inc. Graphical representation of a complex task
US10754822B1 (en) 2018-04-18 2020-08-25 Palantir Technologies Inc. Systems and methods for ontology migration
US10754946B1 (en) 2018-05-08 2020-08-25 Palantir Technologies Inc. Systems and methods for implementing a machine learning approach to modeling entity behavior
US10762471B1 (en) 2017-01-09 2020-09-01 Palantir Technologies Inc. Automating management of integrated workflows based on disparate subsidiary data sources
US10762102B2 (en) 2013-06-20 2020-09-01 Palantir Technologies Inc. System and method for incremental replication
US10769171B1 (en) 2017-12-07 2020-09-08 Palantir Technologies Inc. Relationship analysis and mapping for interrelated multi-layered datasets
US10783162B1 (en) 2017-12-07 2020-09-22 Palantir Technologies Inc. Workflow assistant
US10795909B1 (en) 2018-06-14 2020-10-06 Palantir Technologies Inc. Minimized and collapsed resource dependency path
US10795749B1 (en) 2017-05-31 2020-10-06 Palantir Technologies Inc. Systems and methods for providing fault analysis user interface
US10803106B1 (en) 2015-02-24 2020-10-13 Palantir Technologies Inc. System with methodology for dynamic modular ontology
US10838987B1 (en) 2017-12-20 2020-11-17 Palantir Technologies Inc. Adaptive and transparent entity screening
US10853352B1 (en) 2017-12-21 2020-12-01 Palantir Technologies Inc. Structured data collection, presentation, validation and workflow management
US10853454B2 (en) 2014-03-21 2020-12-01 Palantir Technologies Inc. Provider portal
US10866936B1 (en) 2017-03-29 2020-12-15 Palantir Technologies Inc. Model object management and storage system
US10871878B1 (en) 2015-12-29 2020-12-22 Palantir Technologies Inc. System log analysis and object user interaction correlation system
US10877654B1 (en) 2018-04-03 2020-12-29 Palantir Technologies Inc. Graphical user interfaces for optimizations
US10877984B1 (en) 2017-12-07 2020-12-29 Palantir Technologies Inc. Systems and methods for filtering and visualizing large scale datasets
US10885021B1 (en) 2018-05-02 2021-01-05 Palantir Technologies Inc. Interactive interpreter and graphical user interface
US10909130B1 (en) 2016-07-01 2021-02-02 Palantir Technologies Inc. Graphical user interface for a database system
US10924362B2 (en) 2018-01-15 2021-02-16 Palantir Technologies Inc. Management of software bugs in a data processing system
US10942947B2 (en) 2017-07-17 2021-03-09 Palantir Technologies Inc. Systems and methods for determining relationships between datasets
US10956508B2 (en) 2017-11-10 2021-03-23 Palantir Technologies Inc. Systems and methods for creating and managing a data integration workspace containing automatically updated data models
US10956406B2 (en) 2017-06-12 2021-03-23 Palantir Technologies Inc. Propagated deletion of database records and derived data
US10986119B2 (en) 2015-09-11 2021-04-20 Curtail, Inc. Implementation comparison-based security system
USRE48589E1 (en) 2010-07-15 2021-06-08 Palantir Technologies Inc. Sharing and deconflicting data changes in a multimaster database system
US11035690B2 (en) 2009-07-27 2021-06-15 Palantir Technologies Inc. Geotagging structured data
US11061874B1 (en) 2017-12-14 2021-07-13 Palantir Technologies Inc. Systems and methods for resolving entity data across various data structures
US11061542B1 (en) 2018-06-01 2021-07-13 Palantir Technologies Inc. Systems and methods for determining and displaying optimal associations of data items
US11074277B1 (en) 2017-05-01 2021-07-27 Palantir Technologies Inc. Secure resolution of canonical entities
US11106692B1 (en) 2016-08-04 2021-08-31 Palantir Technologies Inc. Data record resolution and correlation system
US11122143B2 (en) * 2016-02-10 2021-09-14 Curtail, Inc. Comparison of behavioral populations for security and compliance monitoring
US11119630B1 (en) 2018-06-19 2021-09-14 Palantir Technologies Inc. Artificial intelligence assisted evaluations and user interface for same
US11126638B1 (en) 2018-09-13 2021-09-21 Palantir Technologies Inc. Data visualization and parsing system
US11150917B2 (en) 2015-08-26 2021-10-19 Palantir Technologies Inc. System for data aggregation and analysis of data from a plurality of data sources
US11216762B1 (en) 2017-07-13 2022-01-04 Palantir Technologies Inc. Automated risk visualization using customer-centric data analysis
US11250425B1 (en) 2016-11-30 2022-02-15 Palantir Technologies Inc. Generating a statistic using electronic transaction data
US11263382B1 (en) 2017-12-22 2022-03-01 Palantir Technologies Inc. Data normalization and irregularity detection system
US11281726B2 (en) 2017-12-01 2022-03-22 Palantir Technologies Inc. System and methods for faster processor comparisons of visual graph features
US11294928B1 (en) 2018-10-12 2022-04-05 Palantir Technologies Inc. System architecture for relating and linking data objects
US11302426B1 (en) 2015-01-02 2022-04-12 Palantir Technologies Inc. Unified data interface and system
US11314721B1 (en) 2017-12-07 2022-04-26 Palantir Technologies Inc. User-interactive defect analysis for root cause
US11373752B2 (en) 2016-12-22 2022-06-28 Palantir Technologies Inc. Detection of misuse of a benefit system
US11521096B2 (en) 2014-07-22 2022-12-06 Palantir Technologies Inc. System and method for determining a propensity of entity to take a specified action
US11599369B1 (en) 2018-03-08 2023-03-07 Palantir Technologies Inc. Graphical user interface configuration system

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US8121962B2 (en) * 2008-04-25 2012-02-21 Fair Isaac Corporation Automated entity identification for efficient profiling in an event probability prediction system
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
EP2676197B1 (en) 2011-02-18 2018-11-28 CSidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
EP2880619A1 (en) 2012-08-02 2015-06-10 The 41st Parameter, Inc. Systems and methods for accessing records via derivative locators
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US11334878B2 (en) 2013-03-15 2022-05-17 Emc Corporation Combining explicit and implicit feedback in self-learning fraud detection systems
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
CA2888742C (en) 2013-09-23 2015-09-15 Jason G. Tatge Farming data collection and exchange system
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US11037115B2 (en) 2019-09-12 2021-06-15 Capital One Services, Llc Method and system to predict ATM locations for users
US11750638B2 (en) 2021-04-05 2023-09-05 Bank Of America Corporation Server-based anomaly and security threat detection in multiple ATMs

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831532B2 (en) * 2004-11-16 2010-11-09 Microsoft Corporation Precomputation and transmission of time-dependent information for varying or uncertain receipt times
US7966256B2 (en) * 2006-09-22 2011-06-21 Corelogic Information Solutions, Inc. Methods and systems of predicting mortgage payment risk

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2475267C (en) * 2002-02-04 2014-08-05 Cataphora, Inc. A method and apparatus for sociological data mining
US7730063B2 (en) * 2002-12-10 2010-06-01 Asset Trust, Inc. Personalized medicine service
US8121962B2 (en) * 2008-04-25 2012-02-21 Fair Isaac Corporation Automated entity identification for efficient profiling in an event probability prediction system
US8200595B1 (en) * 2008-06-11 2012-06-12 Fair Isaac Corporation Determing a disposition of sensor-based events using decision trees with splits performed on decision keys
US8142283B2 (en) * 2008-08-20 2012-03-27 Cfph, Llc Game of chance processing apparatus

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831532B2 (en) * 2004-11-16 2010-11-09 Microsoft Corporation Precomputation and transmission of time-dependent information for varying or uncertain receipt times
US7966256B2 (en) * 2006-09-22 2011-06-21 Corelogic Information Solutions, Inc. Methods and systems of predicting mortgage payment risk

Cited By (279)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10061828B2 (en) 2006-11-20 2018-08-28 Palantir Technologies, Inc. Cross-ontology multi-master replication
US9589014B2 (en) 2006-11-20 2017-03-07 Palantir Technologies, Inc. Creating data in a data store using a dynamic ontology
US10872067B2 (en) 2006-11-20 2020-12-22 Palantir Technologies, Inc. Creating data in a data store using a dynamic ontology
US10229284B2 (en) 2007-02-21 2019-03-12 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US10719621B2 (en) 2007-02-21 2020-07-21 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US9846731B2 (en) 2007-10-18 2017-12-19 Palantir Technologies, Inc. Resolving database entity information
US9501552B2 (en) 2007-10-18 2016-11-22 Palantir Technologies, Inc. Resolving database entity information
US10733200B2 (en) 2007-10-18 2020-08-04 Palantir Technologies Inc. Resolving database entity information
US8041597B2 (en) * 2008-08-08 2011-10-18 Fair Isaac Corporation Self-calibrating outlier model and adaptive cascade model for fraud detection
US20100036672A1 (en) * 2008-08-08 2010-02-11 Xiang Li Adaptive Outlier Model For Fraud Detection
US10747952B2 (en) 2008-09-15 2020-08-18 Palantir Technologies, Inc. Automatic creation and server push of multiple distinct drafts
US10248294B2 (en) 2008-09-15 2019-04-02 Palantir Technologies, Inc. Modal-less interface enhancements
US9383911B2 (en) 2008-09-15 2016-07-05 Palantir Technologies, Inc. Modal-less interface enhancements
US9348499B2 (en) 2008-09-15 2016-05-24 Palantir Technologies, Inc. Sharing objects that rely on local resources with outside servers
US11035690B2 (en) 2009-07-27 2021-06-15 Palantir Technologies Inc. Geotagging structured data
US9275069B1 (en) 2010-07-07 2016-03-01 Palantir Technologies, Inc. Managing disconnected investigations
USRE48589E1 (en) 2010-07-15 2021-06-08 Palantir Technologies Inc. Sharing and deconflicting data changes in a multimaster database system
US11693877B2 (en) 2011-03-31 2023-07-04 Palantir Technologies Inc. Cross-ontology multi-master replication
US10423582B2 (en) 2011-06-23 2019-09-24 Palantir Technologies, Inc. System and method for investigating large amounts of data
US11392550B2 (en) 2011-06-23 2022-07-19 Palantir Technologies Inc. System and method for investigating large amounts of data
US9514167B2 (en) * 2011-08-01 2016-12-06 Qatar Foundation Behavior based record linkage
US20130036119A1 (en) * 2011-08-01 2013-02-07 Qatar Foundation Behavior Based Record Linkage
US10706220B2 (en) 2011-08-25 2020-07-07 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US9880987B2 (en) 2011-08-25 2018-01-30 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US9058315B2 (en) 2011-08-25 2015-06-16 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US9715518B2 (en) 2012-01-23 2017-07-25 Palantir Technologies, Inc. Cross-ACL multi-master replication
US10585883B2 (en) 2012-09-10 2020-03-10 Palantir Technologies Inc. Search around visual queries
US9898335B1 (en) 2012-10-22 2018-02-20 Palantir Technologies Inc. System and method for batch evaluation programs
US10891312B2 (en) 2012-10-22 2021-01-12 Palantir Technologies Inc. Sharing information between nexuses that use different classification schemes for information access control
US9836523B2 (en) 2012-10-22 2017-12-05 Palantir Technologies Inc. Sharing information between nexuses that use different classification schemes for information access control
US11182204B2 (en) 2012-10-22 2021-11-23 Palantir Technologies Inc. System and method for batch evaluation programs
US9501761B2 (en) 2012-11-05 2016-11-22 Palantir Technologies, Inc. System and method for sharing investigation results
US10311081B2 (en) 2012-11-05 2019-06-04 Palantir Technologies Inc. System and method for sharing investigation results
US10846300B2 (en) 2012-11-05 2020-11-24 Palantir Technologies Inc. System and method for sharing investigation results
US20140165184A1 (en) * 2012-12-12 2014-06-12 Daniel H. Lange Electro-Biometric Authentication
US9672339B2 (en) * 2012-12-12 2017-06-06 Intel Corporation Electro-biometric authentication
US10691662B1 (en) 2012-12-27 2020-06-23 Palantir Technologies Inc. Geo-temporal indexing and searching
US10140664B2 (en) * 2013-03-14 2018-11-27 Palantir Technologies Inc. Resolving similar entities from a transaction database
US10452678B2 (en) 2013-03-15 2019-10-22 Palantir Technologies Inc. Filter chains for exploring large data sets
US10977279B2 (en) 2013-03-15 2021-04-13 Palantir Technologies Inc. Time-sensitive cube
US10152531B2 (en) 2013-03-15 2018-12-11 Palantir Technologies Inc. Computer-implemented systems and methods for comparing and associating objects
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US10275778B1 (en) 2013-03-15 2019-04-30 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures
US8903717B2 (en) 2013-03-15 2014-12-02 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8924389B2 (en) 2013-03-15 2014-12-30 Palantir Technologies Inc. Computer-implemented systems and methods for comparing and associating objects
US10120857B2 (en) 2013-03-15 2018-11-06 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US9286373B2 (en) 2013-03-15 2016-03-15 Palantir Technologies Inc. Computer-implemented systems and methods for comparing and associating objects
US9852205B2 (en) 2013-03-15 2017-12-26 Palantir Technologies Inc. Time-sensitive cube
US8924388B2 (en) 2013-03-15 2014-12-30 Palantir Technologies Inc. Computer-implemented systems and methods for comparing and associating objects
US9495353B2 (en) 2013-03-15 2016-11-15 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US9953445B2 (en) 2013-05-07 2018-04-24 Palantir Technologies Inc. Interactive data object map
US10360705B2 (en) 2013-05-07 2019-07-23 Palantir Technologies Inc. Interactive data object map
US10762102B2 (en) 2013-06-20 2020-09-01 Palantir Technologies Inc. System and method for incremental replication
US10970261B2 (en) 2013-07-05 2021-04-06 Palantir Technologies Inc. System and method for data quality monitors
US9348851B2 (en) 2013-07-05 2016-05-24 Palantir Technologies Inc. Data quality monitors
US11004039B2 (en) 2013-08-08 2021-05-11 Palantir Technologies Inc. Cable reader labeling
US10504067B2 (en) 2013-08-08 2019-12-10 Palantir Technologies Inc. Cable reader labeling
US9785317B2 (en) 2013-09-24 2017-10-10 Palantir Technologies Inc. Presentation and analysis of user interaction data
US10732803B2 (en) 2013-09-24 2020-08-04 Palantir Technologies Inc. Presentation and analysis of user interaction data
US9996229B2 (en) 2013-10-03 2018-06-12 Palantir Technologies Inc. Systems and methods for analyzing performance of an entity
US10635276B2 (en) 2013-10-07 2020-04-28 Palantir Technologies Inc. Cohort-based presentation of user interaction data
US9864493B2 (en) 2013-10-07 2018-01-09 Palantir Technologies Inc. Cohort-based presentation of user interaction data
US10719527B2 (en) 2013-10-18 2020-07-21 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US10198515B1 (en) 2013-12-10 2019-02-05 Palantir Technologies Inc. System and method for aggregating data from a plurality of data sources
US11138279B1 (en) 2013-12-10 2021-10-05 Palantir Technologies Inc. System and method for aggregating data from a plurality of data sources
US9105000B1 (en) 2013-12-10 2015-08-11 Palantir Technologies Inc. Aggregating data from a plurality of data sources
US10025834B2 (en) 2013-12-16 2018-07-17 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US9734217B2 (en) 2013-12-16 2017-08-15 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US9727622B2 (en) 2013-12-16 2017-08-08 Palantir Technologies, Inc. Methods and systems for analyzing entity performance
US10579647B1 (en) 2013-12-16 2020-03-03 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US9210183B2 (en) * 2013-12-19 2015-12-08 Microsoft Technology Licensing, Llc Detecting anomalous activity from accounts of an online service
US20160080406A1 (en) * 2013-12-19 2016-03-17 Microsoft Technology Licensing, Llc Detecting anomalous activity from accounts of an online service
US20150180894A1 (en) * 2013-12-19 2015-06-25 Microsoft Corporation Detecting anomalous activity from accounts of an online service
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10230746B2 (en) 2014-01-03 2019-03-12 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10805321B2 (en) 2014-01-03 2020-10-13 Palantir Technologies Inc. System and method for evaluating network threats and usage
US9100428B1 (en) 2014-01-03 2015-08-04 Palantir Technologies Inc. System and method for evaluating network threats
US10180977B2 (en) 2014-03-18 2019-01-15 Palantir Technologies Inc. Determining and extracting changed data from a data source
US10853454B2 (en) 2014-03-21 2020-12-01 Palantir Technologies Inc. Provider portal
US20150356526A1 (en) * 2014-06-07 2015-12-10 Mark Christmas Intuitive Interactive Automated Video Teller Machine
US9836694B2 (en) 2014-06-30 2017-12-05 Palantir Technologies, Inc. Crime risk forecasting
US9129219B1 (en) 2014-06-30 2015-09-08 Palantir Technologies, Inc. Crime risk forecasting
US9619557B2 (en) 2014-06-30 2017-04-11 Palantir Technologies, Inc. Systems and methods for key phrase characterization of documents
US10180929B1 (en) 2014-06-30 2019-01-15 Palantir Technologies, Inc. Systems and methods for identifying key phrase clusters within documents
US11341178B2 (en) 2014-06-30 2022-05-24 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US10162887B2 (en) 2014-06-30 2018-12-25 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US9881074B2 (en) 2014-07-03 2018-01-30 Palantir Technologies Inc. System and method for news events detection and visualization
US9875293B2 (en) 2014-07-03 2018-01-23 Palanter Technologies Inc. System and method for news events detection and visualization
US10929436B2 (en) 2014-07-03 2021-02-23 Palantir Technologies Inc. System and method for news events detection and visualization
US11861515B2 (en) 2014-07-22 2024-01-02 Palantir Technologies Inc. System and method for determining a propensity of entity to take a specified action
US11521096B2 (en) 2014-07-22 2022-12-06 Palantir Technologies Inc. System and method for determining a propensity of entity to take a specified action
US9880696B2 (en) 2014-09-03 2018-01-30 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US9454281B2 (en) 2014-09-03 2016-09-27 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10866685B2 (en) 2014-09-03 2020-12-15 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US9390086B2 (en) 2014-09-11 2016-07-12 Palantir Technologies Inc. Classification system with methodology for efficient verification
US9767172B2 (en) 2014-10-03 2017-09-19 Palantir Technologies Inc. Data aggregation and analysis system
US10360702B2 (en) 2014-10-03 2019-07-23 Palantir Technologies Inc. Time-series analysis system
US11004244B2 (en) 2014-10-03 2021-05-11 Palantir Technologies Inc. Time-series analysis system
US10664490B2 (en) 2014-10-03 2020-05-26 Palantir Technologies Inc. Data aggregation and analysis system
US9501851B2 (en) 2014-10-03 2016-11-22 Palantir Technologies Inc. Time-series analysis system
US10437450B2 (en) 2014-10-06 2019-10-08 Palantir Technologies Inc. Presentation of multivariate data on a graphical user interface of a computing system
US9984133B2 (en) 2014-10-16 2018-05-29 Palantir Technologies Inc. Schematic and database linking system
US11275753B2 (en) 2014-10-16 2022-03-15 Palantir Technologies Inc. Schematic and database linking system
US9946738B2 (en) 2014-11-05 2018-04-17 Palantir Technologies, Inc. Universal data pipeline
US10191926B2 (en) 2014-11-05 2019-01-29 Palantir Technologies, Inc. Universal data pipeline
US10853338B2 (en) 2014-11-05 2020-12-01 Palantir Technologies Inc. Universal data pipeline
US10728277B2 (en) 2014-11-06 2020-07-28 Palantir Technologies Inc. Malicious software detection in a computing system
US10135863B2 (en) 2014-11-06 2018-11-20 Palantir Technologies Inc. Malicious software detection in a computing system
US20160132887A1 (en) * 2014-11-10 2016-05-12 Mastercard International Incorporated Systems and methods for detecting compromised automated teller machines
US11276067B2 (en) * 2014-11-10 2022-03-15 Mastercard International Incorporated Systems and methods for detecting compromised automated teller machines
US10380593B2 (en) * 2014-11-10 2019-08-13 Mastercard International Incorporated Systems and methods for detecting compromised automated teller machines
US9430507B2 (en) 2014-12-08 2016-08-30 Palantir Technologies, Inc. Distributed acoustic sensing data analysis system
US10242072B2 (en) 2014-12-15 2019-03-26 Palantir Technologies Inc. System and method for associating related records to common entities across multiple lists
US9483546B2 (en) 2014-12-15 2016-11-01 Palantir Technologies Inc. System and method for associating related records to common entities across multiple lists
US9898528B2 (en) 2014-12-22 2018-02-20 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US9348920B1 (en) 2014-12-22 2016-05-24 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US11252248B2 (en) 2014-12-22 2022-02-15 Palantir Technologies Inc. Communication data processing architecture
US10362133B1 (en) 2014-12-22 2019-07-23 Palantir Technologies Inc. Communication data processing architecture
US10452651B1 (en) 2014-12-23 2019-10-22 Palantir Technologies Inc. Searching charts
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US10157200B2 (en) 2014-12-29 2018-12-18 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US10552998B2 (en) 2014-12-29 2020-02-04 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9870389B2 (en) 2014-12-29 2018-01-16 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US11302426B1 (en) 2015-01-02 2022-04-12 Palantir Technologies Inc. Unified data interface and system
US10803106B1 (en) 2015-02-24 2020-10-13 Palantir Technologies Inc. System with methodology for dynamic modular ontology
US9727560B2 (en) 2015-02-25 2017-08-08 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US10474326B2 (en) 2015-02-25 2019-11-12 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US9891808B2 (en) 2015-03-16 2018-02-13 Palantir Technologies Inc. Interactive user interfaces for location-based data analysis
US10459619B2 (en) 2015-03-16 2019-10-29 Palantir Technologies Inc. Interactive user interfaces for location-based data analysis
US9886467B2 (en) 2015-03-19 2018-02-06 Plantir Technologies Inc. System and method for comparing and visualizing data entities and data entity series
US10545982B1 (en) 2015-04-01 2020-01-28 Palantir Technologies Inc. Federated search of multiple sources with conflict resolution
US10103953B1 (en) 2015-05-12 2018-10-16 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10628834B1 (en) 2015-06-16 2020-04-21 Palantir Technologies Inc. Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces
US10636097B2 (en) 2015-07-21 2020-04-28 Palantir Technologies Inc. Systems and models for data analytics
US9661012B2 (en) 2015-07-23 2017-05-23 Palantir Technologies Inc. Systems and methods for identifying information related to payment card breaches
US9392008B1 (en) 2015-07-23 2016-07-12 Palantir Technologies Inc. Systems and methods for identifying information related to payment card breaches
US9996595B2 (en) 2015-08-03 2018-06-12 Palantir Technologies, Inc. Providing full data provenance visualization for versioned datasets
US10484407B2 (en) 2015-08-06 2019-11-19 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US10444940B2 (en) 2015-08-17 2019-10-15 Palantir Technologies Inc. Interactive geospatial map
US10444941B2 (en) 2015-08-17 2019-10-15 Palantir Technologies Inc. Interactive geospatial map
US10127289B2 (en) 2015-08-19 2018-11-13 Palantir Technologies Inc. Systems and methods for automatic clustering and canonical designation of related data in various data structures
US11392591B2 (en) 2015-08-19 2022-07-19 Palantir Technologies Inc. Systems and methods for automatic clustering and canonical designation of related data in various data structures
US11150629B2 (en) 2015-08-20 2021-10-19 Palantir Technologies Inc. Quantifying, tracking, and anticipating risk at a manufacturing facility based on staffing conditions and textual descriptions of deviations
US10579950B1 (en) 2015-08-20 2020-03-03 Palantir Technologies Inc. Quantifying, tracking, and anticipating risk at a manufacturing facility based on staffing conditions and textual descriptions of deviations
US9671776B1 (en) 2015-08-20 2017-06-06 Palantir Technologies Inc. Quantifying, tracking, and anticipating risk at a manufacturing facility, taking deviation type and staffing conditions into account
US11934847B2 (en) 2015-08-26 2024-03-19 Palantir Technologies Inc. System for data aggregation and analysis of data from a plurality of data sources
US11150917B2 (en) 2015-08-26 2021-10-19 Palantir Technologies Inc. System for data aggregation and analysis of data from a plurality of data sources
US10346410B2 (en) 2015-08-28 2019-07-09 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9485265B1 (en) 2015-08-28 2016-11-01 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9898509B2 (en) 2015-08-28 2018-02-20 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US11048706B2 (en) 2015-08-28 2021-06-29 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US10706434B1 (en) 2015-09-01 2020-07-07 Palantir Technologies Inc. Methods and systems for determining location information
US9996553B1 (en) 2015-09-04 2018-06-12 Palantir Technologies Inc. Computer-implemented systems and methods for data management and visualization
US9639580B1 (en) 2015-09-04 2017-05-02 Palantir Technologies, Inc. Computer-implemented systems and methods for data management and visualization
US9984428B2 (en) 2015-09-04 2018-05-29 Palantir Technologies Inc. Systems and methods for structuring data from unstructured electronic data files
US11080296B2 (en) 2015-09-09 2021-08-03 Palantir Technologies Inc. Domain-specific language for dataset transformations
US9965534B2 (en) 2015-09-09 2018-05-08 Palantir Technologies, Inc. Domain-specific language for dataset transformations
US10986119B2 (en) 2015-09-11 2021-04-20 Curtail, Inc. Implementation comparison-based security system
US11637856B2 (en) 2015-09-11 2023-04-25 Curtail, Inc. Implementation comparison-based security system
US10192333B1 (en) 2015-10-21 2019-01-29 Palantir Technologies Inc. Generating graphical representations of event participation flow
US9424669B1 (en) 2015-10-21 2016-08-23 Palantir Technologies Inc. Generating graphical representations of event participation flow
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US20170154276A1 (en) * 2015-11-27 2017-06-01 Tata Consultancy Services Limited Event prediction system and method
US10223429B2 (en) 2015-12-01 2019-03-05 Palantir Technologies Inc. Entity data attribution using disparate data sets
US10706056B1 (en) 2015-12-02 2020-07-07 Palantir Technologies Inc. Audit log report generator
US9514414B1 (en) 2015-12-11 2016-12-06 Palantir Technologies Inc. Systems and methods for identifying and categorizing electronic documents through machine learning
US10817655B2 (en) 2015-12-11 2020-10-27 Palantir Technologies Inc. Systems and methods for annotating and linking electronic documents
US9760556B1 (en) 2015-12-11 2017-09-12 Palantir Technologies Inc. Systems and methods for annotating and linking electronic documents
US10114884B1 (en) 2015-12-16 2018-10-30 Palantir Technologies Inc. Systems and methods for attribute analysis of one or more databases
US11106701B2 (en) 2015-12-16 2021-08-31 Palantir Technologies Inc. Systems and methods for attribute analysis of one or more databases
US10678860B1 (en) 2015-12-17 2020-06-09 Palantir Technologies, Inc. Automatic generation of composite datasets based on hierarchical fields
US10373099B1 (en) 2015-12-18 2019-08-06 Palantir Technologies Inc. Misalignment detection system for efficiently processing database-stored data and automatically generating misalignment information for display in interactive user interfaces
US11829928B2 (en) 2015-12-18 2023-11-28 Palantir Technologies Inc. Misalignment detection system for efficiently processing database-stored data and automatically generating misalignment information for display in interactive user interfaces
US11625529B2 (en) 2015-12-29 2023-04-11 Palantir Technologies Inc. Real-time document annotation
US10871878B1 (en) 2015-12-29 2020-12-22 Palantir Technologies Inc. System log analysis and object user interaction correlation system
US9996236B1 (en) 2015-12-29 2018-06-12 Palantir Technologies Inc. Simplified frontend processing and visualization of large datasets
US10089289B2 (en) 2015-12-29 2018-10-02 Palantir Technologies Inc. Real-time document annotation
US10795918B2 (en) 2015-12-29 2020-10-06 Palantir Technologies Inc. Simplified frontend processing and visualization of large datasets
US10839144B2 (en) 2015-12-29 2020-11-17 Palantir Technologies Inc. Real-time document annotation
US9792020B1 (en) 2015-12-30 2017-10-17 Palantir Technologies Inc. Systems for collecting, aggregating, and storing data, generating interactive user interfaces for analyzing data, and generating alerts based upon collected data
US10460486B2 (en) 2015-12-30 2019-10-29 Palantir Technologies Inc. Systems for collecting, aggregating, and storing data, generating interactive user interfaces for analyzing data, and generating alerts based upon collected data
US11122143B2 (en) * 2016-02-10 2021-09-14 Curtail, Inc. Comparison of behavioral populations for security and compliance monitoring
US10248722B2 (en) 2016-02-22 2019-04-02 Palantir Technologies Inc. Multi-language support for dynamic ontology
US10909159B2 (en) 2016-02-22 2021-02-02 Palantir Technologies Inc. Multi-language support for dynamic ontology
US10698938B2 (en) 2016-03-18 2020-06-30 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US9652139B1 (en) 2016-04-06 2017-05-16 Palantir Technologies Inc. Graphical representation of an output
US10068199B1 (en) 2016-05-13 2018-09-04 Palantir Technologies Inc. System to catalogue tracking data
US10311440B2 (en) * 2016-05-24 2019-06-04 International Business Machines Corporation Context-aware deterrent and response system for financial transaction device security
US10007674B2 (en) 2016-06-13 2018-06-26 Palantir Technologies Inc. Data revision control in large-scale data analytic systems
US11106638B2 (en) 2016-06-13 2021-08-31 Palantir Technologies Inc. Data revision control in large-scale data analytic systems
US10545975B1 (en) 2016-06-22 2020-01-28 Palantir Technologies Inc. Visual analysis of data using sequenced dataset reduction
US11269906B2 (en) 2016-06-22 2022-03-08 Palantir Technologies Inc. Visual analysis of data using sequenced dataset reduction
US10909130B1 (en) 2016-07-01 2021-02-02 Palantir Technologies Inc. Graphical user interface for a database system
US10719188B2 (en) 2016-07-21 2020-07-21 Palantir Technologies Inc. Cached database and synchronization system for providing dynamic linked panels in user interface
US10698594B2 (en) 2016-07-21 2020-06-30 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10324609B2 (en) 2016-07-21 2019-06-18 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US11106692B1 (en) 2016-08-04 2021-08-31 Palantir Technologies Inc. Data record resolution and correlation system
US11954300B2 (en) 2016-09-27 2024-04-09 Palantir Technologies Inc. User interface based variable machine modeling
US10552002B1 (en) 2016-09-27 2020-02-04 Palantir Technologies Inc. User interface based variable machine modeling
US10942627B2 (en) 2016-09-27 2021-03-09 Palantir Technologies Inc. User interface based variable machine modeling
US10133588B1 (en) 2016-10-20 2018-11-20 Palantir Technologies Inc. Transforming instructions for collaborative updates
US20180121922A1 (en) * 2016-10-28 2018-05-03 Fair Isaac Corporation High resolution transaction-level fraud detection for payment cards in a potential state of fraud
US11367074B2 (en) * 2016-10-28 2022-06-21 Fair Isaac Corporation High resolution transaction-level fraud detection for payment cards in a potential state of fraud
US11715167B2 (en) 2016-11-11 2023-08-01 Palantir Technologies Inc. Graphical representation of a complex task
US11227344B2 (en) 2016-11-11 2022-01-18 Palantir Technologies Inc. Graphical representation of a complex task
US10726507B1 (en) 2016-11-11 2020-07-28 Palantir Technologies Inc. Graphical representation of a complex task
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US11468450B2 (en) 2016-11-21 2022-10-11 Palantir Technologies Inc. System to identify vulnerable card readers
US10176482B1 (en) 2016-11-21 2019-01-08 Palantir Technologies Inc. System to identify vulnerable card readers
US10796318B2 (en) 2016-11-21 2020-10-06 Palantir Technologies Inc. System to identify vulnerable card readers
US11250425B1 (en) 2016-11-30 2022-02-15 Palantir Technologies Inc. Generating a statistic using electronic transaction data
US10885456B2 (en) 2016-12-16 2021-01-05 Palantir Technologies Inc. Processing sensor logs
US9886525B1 (en) 2016-12-16 2018-02-06 Palantir Technologies Inc. Data item aggregate probability analysis system
US10691756B2 (en) 2016-12-16 2020-06-23 Palantir Technologies Inc. Data item aggregate probability analysis system
US10402742B2 (en) 2016-12-16 2019-09-03 Palantir Technologies Inc. Processing sensor logs
US10044836B2 (en) 2016-12-19 2018-08-07 Palantir Technologies Inc. Conducting investigations under limited connectivity
US10523787B2 (en) 2016-12-19 2019-12-31 Palantir Technologies Inc. Conducting investigations under limited connectivity
US11316956B2 (en) 2016-12-19 2022-04-26 Palantir Technologies Inc. Conducting investigations under limited connectivity
US10249033B1 (en) 2016-12-20 2019-04-02 Palantir Technologies Inc. User interface for managing defects
US10839504B2 (en) 2016-12-20 2020-11-17 Palantir Technologies Inc. User interface for managing defects
US10728262B1 (en) 2016-12-21 2020-07-28 Palantir Technologies Inc. Context-aware network-based malicious activity warning systems
US10360238B1 (en) 2016-12-22 2019-07-23 Palantir Technologies Inc. Database systems and user interfaces for interactive data association, analysis, and presentation
US11373752B2 (en) 2016-12-22 2022-06-28 Palantir Technologies Inc. Detection of misuse of a benefit system
US11250027B2 (en) 2016-12-22 2022-02-15 Palantir Technologies Inc. Database systems and user interfaces for interactive data association, analysis, and presentation
US10721262B2 (en) 2016-12-28 2020-07-21 Palantir Technologies Inc. Resource-centric network cyber attack warning system
US11113298B2 (en) 2017-01-05 2021-09-07 Palantir Technologies Inc. Collaborating using different object models
US10216811B1 (en) 2017-01-05 2019-02-26 Palantir Technologies Inc. Collaborating using different object models
US10762471B1 (en) 2017-01-09 2020-09-01 Palantir Technologies Inc. Automating management of integrated workflows based on disparate subsidiary data sources
US11126489B2 (en) 2017-01-18 2021-09-21 Palantir Technologies Inc. Data analysis system to facilitate investigative process
US10133621B1 (en) 2017-01-18 2018-11-20 Palantir Technologies Inc. Data analysis system to facilitate investigative process
US11892901B2 (en) 2017-01-18 2024-02-06 Palantir Technologies Inc. Data analysis system to facilitate investigative process
US10509844B1 (en) 2017-01-19 2019-12-17 Palantir Technologies Inc. Network graph parser
US10515109B2 (en) 2017-02-15 2019-12-24 Palantir Technologies Inc. Real-time auditing of industrial equipment condition
US11907175B2 (en) 2017-03-29 2024-02-20 Palantir Technologies Inc. Model object management and storage system
US10866936B1 (en) 2017-03-29 2020-12-15 Palantir Technologies Inc. Model object management and storage system
US10581954B2 (en) 2017-03-29 2020-03-03 Palantir Technologies Inc. Metric collection and aggregation for distributed software services
US11526471B2 (en) 2017-03-29 2022-12-13 Palantir Technologies Inc. Model object management and storage system
US10915536B2 (en) 2017-04-11 2021-02-09 Palantir Technologies Inc. Systems and methods for constraint driven database searching
US10133783B2 (en) 2017-04-11 2018-11-20 Palantir Technologies Inc. Systems and methods for constraint driven database searching
US11074277B1 (en) 2017-05-01 2021-07-27 Palantir Technologies Inc. Secure resolution of canonical entities
US11199418B2 (en) 2017-05-09 2021-12-14 Palantir Technologies Inc. Event-based route planning
US10563990B1 (en) 2017-05-09 2020-02-18 Palantir Technologies Inc. Event-based route planning
US11761771B2 (en) 2017-05-09 2023-09-19 Palantir Technologies Inc. Event-based route planning
US10606872B1 (en) 2017-05-22 2020-03-31 Palantir Technologies Inc. Graphical user interface for a database system
US10795749B1 (en) 2017-05-31 2020-10-06 Palantir Technologies Inc. Systems and methods for providing fault analysis user interface
US10956406B2 (en) 2017-06-12 2021-03-23 Palantir Technologies Inc. Propagated deletion of database records and derived data
US11216762B1 (en) 2017-07-13 2022-01-04 Palantir Technologies Inc. Automated risk visualization using customer-centric data analysis
US11769096B2 (en) 2017-07-13 2023-09-26 Palantir Technologies Inc. Automated risk visualization using customer-centric data analysis
US10942947B2 (en) 2017-07-17 2021-03-09 Palantir Technologies Inc. Systems and methods for determining relationships between datasets
US11269931B2 (en) 2017-07-24 2022-03-08 Palantir Technologies Inc. Interactive geospatial map and geospatial visualization systems
US10430444B1 (en) 2017-07-24 2019-10-01 Palantir Technologies Inc. Interactive geospatial map and geospatial visualization systems
US10956508B2 (en) 2017-11-10 2021-03-23 Palantir Technologies Inc. Systems and methods for creating and managing a data integration workspace containing automatically updated data models
US11741166B2 (en) 2017-11-10 2023-08-29 Palantir Technologies Inc. Systems and methods for creating and managing a data integration workspace
US11281726B2 (en) 2017-12-01 2022-03-22 Palantir Technologies Inc. System and methods for faster processor comparisons of visual graph features
US10235533B1 (en) 2017-12-01 2019-03-19 Palantir Technologies Inc. Multi-user access controls in electronic simultaneously editable document editor
US10783162B1 (en) 2017-12-07 2020-09-22 Palantir Technologies Inc. Workflow assistant
US11314721B1 (en) 2017-12-07 2022-04-26 Palantir Technologies Inc. User-interactive defect analysis for root cause
US10769171B1 (en) 2017-12-07 2020-09-08 Palantir Technologies Inc. Relationship analysis and mapping for interrelated multi-layered datasets
US11789931B2 (en) 2017-12-07 2023-10-17 Palantir Technologies Inc. User-interactive defect analysis for root cause
US10877984B1 (en) 2017-12-07 2020-12-29 Palantir Technologies Inc. Systems and methods for filtering and visualizing large scale datasets
US11061874B1 (en) 2017-12-14 2021-07-13 Palantir Technologies Inc. Systems and methods for resolving entity data across various data structures
US10838987B1 (en) 2017-12-20 2020-11-17 Palantir Technologies Inc. Adaptive and transparent entity screening
US10853352B1 (en) 2017-12-21 2020-12-01 Palantir Technologies Inc. Structured data collection, presentation, validation and workflow management
US11263382B1 (en) 2017-12-22 2022-03-01 Palantir Technologies Inc. Data normalization and irregularity detection system
CN108229964A (en) * 2017-12-25 2018-06-29 同济大学 Trading activity profile is built and authentication method, system, medium and equipment
US10924362B2 (en) 2018-01-15 2021-02-16 Palantir Technologies Inc. Management of software bugs in a data processing system
US11599369B1 (en) 2018-03-08 2023-03-07 Palantir Technologies Inc. Graphical user interface configuration system
US10877654B1 (en) 2018-04-03 2020-12-29 Palantir Technologies Inc. Graphical user interfaces for optimizations
US10754822B1 (en) 2018-04-18 2020-08-25 Palantir Technologies Inc. Systems and methods for ontology migration
US10885021B1 (en) 2018-05-02 2021-01-05 Palantir Technologies Inc. Interactive interpreter and graphical user interface
US10754946B1 (en) 2018-05-08 2020-08-25 Palantir Technologies Inc. Systems and methods for implementing a machine learning approach to modeling entity behavior
US11928211B2 (en) 2018-05-08 2024-03-12 Palantir Technologies Inc. Systems and methods for implementing a machine learning approach to modeling entity behavior
US11507657B2 (en) 2018-05-08 2022-11-22 Palantir Technologies Inc. Systems and methods for implementing a machine learning approach to modeling entity behavior
US11061542B1 (en) 2018-06-01 2021-07-13 Palantir Technologies Inc. Systems and methods for determining and displaying optimal associations of data items
US10795909B1 (en) 2018-06-14 2020-10-06 Palantir Technologies Inc. Minimized and collapsed resource dependency path
US11119630B1 (en) 2018-06-19 2021-09-14 Palantir Technologies Inc. Artificial intelligence assisted evaluations and user interface for same
US11126638B1 (en) 2018-09-13 2021-09-21 Palantir Technologies Inc. Data visualization and parsing system
US11294928B1 (en) 2018-10-12 2022-04-05 Palantir Technologies Inc. System architecture for relating and linking data objects

Also Published As

Publication number Publication date
US20120150779A1 (en) 2012-06-14
US8645301B2 (en) 2014-02-04
US8121962B2 (en) 2012-02-21
US8332338B2 (en) 2012-12-11
US20130103629A1 (en) 2013-04-25

Similar Documents

Publication Publication Date Title
US8121962B2 (en) Automated entity identification for efficient profiling in an event probability prediction system
US11023963B2 (en) Detection of compromise of merchants, ATMs, and networks
US8131615B2 (en) Incremental factorization-based smoothing of sparse multi-dimensional risk tables
US20200192894A1 (en) System and method for using data incident based modeling and prediction
US10896381B2 (en) Behavioral misalignment detection within entity hard segmentation utilizing archetype-clustering
Edge et al. A survey of signature based methods for financial fraud detection
US20180053188A1 (en) Customer transaction behavioral archetype analytics for cnp merchant transaction fraud detection
EP1975869A1 (en) Enhanced fraud detection with terminal transaction-sequence processing
Seyedhossein et al. Mining information from credit card time series for timelier fraud detection
US20130124393A1 (en) Connecting decisions through customer transaction profiles
US20100257092A1 (en) System and method for predicting a measure of anomalousness and similarity of records in relation to a set of reference records
EP1904965A2 (en) Mass compromise / point of compromise analytic detection and compromised card portfolio management system
US11841941B2 (en) Systems and methods for accelerated detection and replacement of anomalous machine learning-based ensembles and intelligent generation of anomalous artifacts for anomalous ensembles
US20220114466A1 (en) Synthetic identity detection
Lopes et al. Applying user signatures on fraud detection in telecommunications networks
US11880890B2 (en) Detecting money laundering activities using drift in a trained Siamese neural network
Prakash et al. ATM Card Fraud Detection System Using Machine Learning Techniques
US20230351210A1 (en) Multiuser learning system for detecting a diverse set of rare behavior
US11328301B2 (en) Online incremental machine learning clustering in anti-money laundering detection
US20230052225A1 (en) Methods and computer systems for automated event detection based on machine learning
Ertuğrul Customer Transaction Predictive Modeling via Machine Learning Algorithms
Grigoryan Realized volatility and price determinants of Bitcoin
Aravindh et al. Online Credit Card Fraudulent Detection Using Data Mining
Seyedhossein et al. A Timelier Credit Card Fraud Detection by Mining Transaction Time Series
Hashemi A Timelier Credit Card Fraud Detection by Mining Transaction Time Series

Legal Events

Date Code Title Description
AS Assignment

Owner name: FAIR ISAAC CORPORATION, MINNESOTA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VAICIULIS, ANTHONY;PERANICH, LARRY;MAYER, UEW;AND OTHERS;REEL/FRAME:021527/0450;SIGNING DATES FROM 20080820 TO 20080822

Owner name: FAIR ISAAC CORPORATION, MINNESOTA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VAICIULIS, ANTHONY;PERANICH, LARRY;MAYER, UEW;AND OTHERS;SIGNING DATES FROM 20080820 TO 20080822;REEL/FRAME:021527/0450

AS Assignment

Owner name: FAIR ISAAC CORPORATION, MINNESOTA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE SPELLING OF ASSIGNOR #3 NAME FROM UEW MAYER TO UWE MAYER PREVIOUSLY RECORDED ON REEL 021527 FRAME 0450. ASSIGNOR(S) HEREBY CONFIRMS THE EXECUTED ASSIGNMENT ATTACHED SHOWS THE CORRECT SPELLING OF THE 3RD ASSIGNOR'S FULL NAME;ASSIGNORS:VAICIULIS, ANTHONY;PERANICH, LARRY;MAYER, UWE;AND OTHERS;SIGNING DATES FROM 20080820 TO 20080822;REEL/FRAME:027042/0190

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12